Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe
-
Size
169KB
-
MD5
ad9890d47696d627e240a9f2e37218ee
-
SHA1
9c5bd38aa995510b937d408ec5f9fb10a23405c2
-
SHA256
bfa5778739336affefdf7843b62c32745bcf4cf82a7a03231a0f6c0d6fe4c17e
-
SHA512
aaf1f9feee4a1484107fcc477b06b958c12058209821522a12a13b7e81eb759ea8dedfd492674555ab406644e2f3008a9c66e4bb099a9e9891d3d8dd6e825ce2
-
SSDEEP
3072:ecUcm0X3qDOUwUNvo8Hj/64qDuibRF+phTjJfscmIBaOgg+mOi5f:ecUK3qDpvTT6LDuibf+phTjJEmBdgpi5
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 996 sesdessecetra.exe 3916 sesdessecetra.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3632 set thread context of 4116 3632 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 85 PID 996 set thread context of 3916 996 sesdessecetra.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sesdessecetra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sesdessecetra.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3632 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 996 sesdessecetra.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4116 3632 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 85 PID 3632 wrote to memory of 4116 3632 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 85 PID 3632 wrote to memory of 4116 3632 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 85 PID 3632 wrote to memory of 4116 3632 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 85 PID 3632 wrote to memory of 4116 3632 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 85 PID 3632 wrote to memory of 4116 3632 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 85 PID 3632 wrote to memory of 4116 3632 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 85 PID 3632 wrote to memory of 4116 3632 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 85 PID 4116 wrote to memory of 996 4116 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 93 PID 4116 wrote to memory of 996 4116 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 93 PID 4116 wrote to memory of 996 4116 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 93 PID 996 wrote to memory of 3916 996 sesdessecetra.exe 94 PID 996 wrote to memory of 3916 996 sesdessecetra.exe 94 PID 996 wrote to memory of 3916 996 sesdessecetra.exe 94 PID 996 wrote to memory of 3916 996 sesdessecetra.exe 94 PID 996 wrote to memory of 3916 996 sesdessecetra.exe 94 PID 996 wrote to memory of 3916 996 sesdessecetra.exe 94 PID 996 wrote to memory of 3916 996 sesdessecetra.exe 94 PID 996 wrote to memory of 3916 996 sesdessecetra.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5ad9890d47696d627e240a9f2e37218ee
SHA19c5bd38aa995510b937d408ec5f9fb10a23405c2
SHA256bfa5778739336affefdf7843b62c32745bcf4cf82a7a03231a0f6c0d6fe4c17e
SHA512aaf1f9feee4a1484107fcc477b06b958c12058209821522a12a13b7e81eb759ea8dedfd492674555ab406644e2f3008a9c66e4bb099a9e9891d3d8dd6e825ce2