Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 08:42
Static task
static1
Behavioral task
behavioral1
Sample
ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe
-
Size
4KB
-
MD5
ae8ea3218b39e89ae9dc8a89772c07b2
-
SHA1
037244743f5d53a9e9f0981ee40abc803b8bb5b9
-
SHA256
56b1104267ce1341a949016b14400b2724b3cdd656f6e61aecc4781102c659f0
-
SHA512
50fedc2ee0a16f800fbfbadfdad95a7520a242c50ac7d47c4cbadaa9bc86670a55349216863007a74c19e14304f85d5f93162cbf6aeb76d2668df1f24df01640
-
SSDEEP
48:ZvtYWqYhUFkhpEvBJYzpRcIkhc7ZjzRxXg:Z1YWtUpXYdRcpc7ZJxQ
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\fasm2.bat ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe File created C:\Windows\SysWOW64\batinit.bat cmd.exe File opened for modification C:\Windows\SysWOW64\batinit.bat cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 3084 cmd.exe Token: SeSystemtimePrivilege 3084 cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2408 wrote to memory of 3084 2408 ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe 84 PID 2408 wrote to memory of 3084 2408 ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe 84 PID 2408 wrote to memory of 3084 2408 ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe 84 PID 3084 wrote to memory of 2792 3084 cmd.exe 86 PID 3084 wrote to memory of 2792 3084 cmd.exe 86 PID 3084 wrote to memory of 2792 3084 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\fasm2.bat2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Command Processor" /v AutoRun /t REG_SZ /d "C:\Windows\system32\batinit.bat" /f3⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD596e73a368f0b01d5c280e7e9ec8a6701
SHA17a3849127b52f36a38bd6ce72af8de111587a3db
SHA256bc0e1b5c93e327c064b520fac7481dda417c93cb5833df49beee82bcd7dce5ed
SHA5125078742dfb67dbb9aea51357747cec8b13530e0cdc9ccf69ab31481fc47f0ac614993bae35694896a0395a00eae0f0d293e748d7563599d1de782fccd18d97e4