Analysis
-
max time kernel
142s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe
-
Size
479KB
-
MD5
add7e22b5b93307a23ecc221cc3c4e6e
-
SHA1
fe4b5870472dd9f3dad7974ead1fa6c2b6ff81a5
-
SHA256
1e8c742fce5fc1a8f7026e6df573d77897a7e396dfad31a68226ce64d325db9a
-
SHA512
50e87875c33d41843319119a336e76fbdb8e8fb53091741d07056797bb15420e4106170d408a8ef54814ba703bff221e709e84a0ef0f1f52d2f1808d872a9805
-
SSDEEP
6144:qTOGarsHLBIDFU3g2bOqQWb8OiuzSpOuardjJkotI4hT3+HSlJRlb0ehG8Z30i:WasHFeFUQhzcouzThJkufNZJjH3Z3/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\svchost.exe" add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3060 svchost.exe 2892 svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3056 set thread context of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3060 set thread context of 2892 3060 svchost.exe 31 -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\41.tmp svchost.exe File opened for modification C:\Windows\log.htm svchost.exe File created C:\Windows\41.tmp add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe File created C:\Windows\svchost.exe add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe File opened for modification C:\Windows\svchost.exe add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe File opened for modification C:\Windows\log.htm add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe File created C:\Windows\log.htm add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2704 3056 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 29 PID 2704 wrote to memory of 3060 2704 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 30 PID 2704 wrote to memory of 3060 2704 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 30 PID 2704 wrote to memory of 3060 2704 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 30 PID 2704 wrote to memory of 3060 2704 add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31 PID 3060 wrote to memory of 2892 3060 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\svchost.exeC:\Windows\svchost.exe --first-run3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD509b04f2311e2f1d2da39fb43666138b6
SHA1a00fb6dea3d8413498cd3480b29d91656c5edcc4
SHA2563f1b97b3dbb77c04ebd03ca6d51736474905114fb1d2a63726cb5aeb67173067
SHA512b49679878b5c67f81feea82fb93a1a844cacf4706fb063273052b2e3260d4f703e4ee5a8c14cb805f4e9e579c8db24c9d1ebe82166b994ad7de5087054948bc6
-
Filesize
1KB
MD594bf5e2e097ced94991a6133e3722ad9
SHA12f9530fa5bdbb9765971421380fe65d506050764
SHA256a5fabcc9b13bca25a565c031bc1ab704b6cac8d1b1f7b65b0cf2ffebba581997
SHA5122b353d946de2eed432209daede9c3b074751b39029bc4dc4ca3e97981a0dcb93f6bee24fb9d0e5f3d49b405df8efa228a2f3d0dfdbcf11df3df17775fb70b899
-
Filesize
479KB
MD5add7e22b5b93307a23ecc221cc3c4e6e
SHA1fe4b5870472dd9f3dad7974ead1fa6c2b6ff81a5
SHA2561e8c742fce5fc1a8f7026e6df573d77897a7e396dfad31a68226ce64d325db9a
SHA51250e87875c33d41843319119a336e76fbdb8e8fb53091741d07056797bb15420e4106170d408a8ef54814ba703bff221e709e84a0ef0f1f52d2f1808d872a9805