Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
adc55eb722f367125e2c340136789543_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
adc55eb722f367125e2c340136789543_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
adc55eb722f367125e2c340136789543_JaffaCakes118.exe
-
Size
12.3MB
-
MD5
adc55eb722f367125e2c340136789543
-
SHA1
a6c0286238dce97d36a6c4497c8536e20a7aafda
-
SHA256
c46673123ec8ecdc19d56d7891852006a9ac65a68ef575a2df5a7cb19798a6e0
-
SHA512
96db07ad69f9a1f52c0b3aaa8ceafbb92f8edb74fb931d3f4565ddba52acec132857437b94b0a24d13872b8466da74eb0ddf4ca7a330cba2479f52a067d5c19e
-
SSDEEP
3072:S1u9x2gBvT/I2+MIGkMTe+RejG1YE5XogzodjJdWpFZ7:S1u9x2gNTwOx4E10R4Z7
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reptile.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reptile.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reptile.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\reptile.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\reptile.exe:*:Enabled:Windows Update Manager" reptile.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation adc55eb722f367125e2c340136789543_JaffaCakes118.exe -
Executes dropped EXE 7 IoCs
pid Process 3592 reptile.exe 2692 Adobe Keygen.exe 3228 reptile.exe 4440 reptile.exe 2368 iexplorer.exe 4476 iexplorer.exe 4064 iexplorer.exe -
resource yara_rule behavioral2/files/0x00080000000234de-10.dat upx behavioral2/memory/2692-17-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-41-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-42-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-44-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-46-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-48-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-50-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-52-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-54-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-56-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-58-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-60-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-62-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-64-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-66-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/2692-68-0x0000000000400000-0x0000000000499000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update Manager = "iexplorer.exe" reptile.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1524 set thread context of 4208 1524 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 85 PID 3592 set thread context of 3228 3592 reptile.exe 90 PID 3228 set thread context of 4440 3228 reptile.exe 91 PID 2368 set thread context of 4476 2368 iexplorer.exe 94 PID 4476 set thread context of 4064 4476 iexplorer.exe 95 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\iexplorer.exe reptile.exe File opened for modification C:\Windows\iexplorer.exe reptile.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc55eb722f367125e2c340136789543_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobe Keygen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc55eb722f367125e2c340136789543_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reptile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reptile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reptile.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 Adobe Keygen.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1868 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1868 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4208 1524 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 85 PID 1524 wrote to memory of 4208 1524 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 85 PID 1524 wrote to memory of 4208 1524 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 85 PID 1524 wrote to memory of 4208 1524 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 85 PID 1524 wrote to memory of 4208 1524 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 85 PID 4208 wrote to memory of 3592 4208 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 88 PID 4208 wrote to memory of 3592 4208 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 88 PID 4208 wrote to memory of 3592 4208 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 88 PID 4208 wrote to memory of 2692 4208 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 89 PID 4208 wrote to memory of 2692 4208 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 89 PID 4208 wrote to memory of 2692 4208 adc55eb722f367125e2c340136789543_JaffaCakes118.exe 89 PID 3592 wrote to memory of 3228 3592 reptile.exe 90 PID 3592 wrote to memory of 3228 3592 reptile.exe 90 PID 3592 wrote to memory of 3228 3592 reptile.exe 90 PID 3592 wrote to memory of 3228 3592 reptile.exe 90 PID 3592 wrote to memory of 3228 3592 reptile.exe 90 PID 3228 wrote to memory of 4440 3228 reptile.exe 91 PID 3228 wrote to memory of 4440 3228 reptile.exe 91 PID 3228 wrote to memory of 4440 3228 reptile.exe 91 PID 3228 wrote to memory of 4440 3228 reptile.exe 91 PID 3228 wrote to memory of 4440 3228 reptile.exe 91 PID 4440 wrote to memory of 2368 4440 reptile.exe 93 PID 4440 wrote to memory of 2368 4440 reptile.exe 93 PID 4440 wrote to memory of 2368 4440 reptile.exe 93 PID 2368 wrote to memory of 4476 2368 iexplorer.exe 94 PID 2368 wrote to memory of 4476 2368 iexplorer.exe 94 PID 2368 wrote to memory of 4476 2368 iexplorer.exe 94 PID 2368 wrote to memory of 4476 2368 iexplorer.exe 94 PID 2368 wrote to memory of 4476 2368 iexplorer.exe 94 PID 4476 wrote to memory of 4064 4476 iexplorer.exe 95 PID 4476 wrote to memory of 4064 4476 iexplorer.exe 95 PID 4476 wrote to memory of 4064 4476 iexplorer.exe 95 PID 4476 wrote to memory of 4064 4476 iexplorer.exe 95 PID 4476 wrote to memory of 4064 4476 iexplorer.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\adc55eb722f367125e2c340136789543_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\adc55eb722f367125e2c340136789543_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\adc55eb722f367125e2c340136789543_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\adc55eb722f367125e2c340136789543_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\reptile.exe"C:\Users\Admin\AppData\Local\Temp\reptile.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\reptile.exe"C:\Users\Admin\AppData\Local\Temp\reptile.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\reptile.exe"C:\Users\Admin\AppData\Local\Temp\reptile.exe"5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\iexplorer.exe"C:\Windows\iexplorer.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\iexplorer.exe"C:\Windows\iexplorer.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\iexplorer.exe"C:\Windows\iexplorer.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4064
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Adobe Keygen.exe"C:\Users\Admin\AppData\Local\Temp\Adobe Keygen.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2692
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x538 0x52c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD58676b828080ebc2e4d678ebc39c8d35d
SHA1978d178307be5838e61f216083a8d87f7a9b2f0c
SHA2560245d0a11c392294dd118a20608b2ef35262f3652a5c84ae9f115bef61330123
SHA512ec693de4be30a997897367943488b951b67eac965ac89b32b0183f614c837cf6238f0c78312e251aeea56a0ce5a81f96f06c01a7074b2826f337345a306a7c81
-
Filesize
52KB
MD57c9a032aa324fe37d8b45096ae0f3ed6
SHA178008b53ffeb7398384ec1d409095bb613911b8d
SHA25609e317b750128b38ed7b07edac6ae3f06f10420eba26f78d18729527cae1e861
SHA5123e55e77369182f4be41d1e83c27c4c12049bb40ca3790784023d5389a17ff95d6a4df992cd312588a371369b2992a6cd516f9217b8aef115a4f868851b441638