Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe
-
Size
3.2MB
-
MD5
aeb805ea2d57f2f9f49fa8ab1807ffda
-
SHA1
d7344ba880c2f83a8e9c347f8d4c107e4d94088c
-
SHA256
ec6f978e3825a28ffa1eeb50033da12f34cbe46c6629728a51a562aa13a996a8
-
SHA512
e77be5d47ccab956243947b9f38c174c4c128c2ded0f85e25babd365c670d7a5b04bec8ca9295b398bd14313bfade994d908c77c7f697ef2a3298604fde7d1d4
-
SSDEEP
49152:shPg95YC1yRr5R+jzA66ymAu1Rx48D9d5VGoemc6RdYdW9HuRs7fg9FLuWV355Fx:ggXt1yRr8zA6POQ149HuRs7fgno
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3472 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Task Host = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Task Host = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf taskhost.exe File opened for modification F:\autorun.inf taskhost.exe File created F:\autorun.inf taskhost.exe File opened for modification C:\autorun.inf taskhost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4860 wrote to memory of 3472 4860 aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe 86 PID 4860 wrote to memory of 3472 4860 aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe 86 PID 4860 wrote to memory of 3472 4860 aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe 86 PID 3472 wrote to memory of 4684 3472 taskhost.exe 90 PID 3472 wrote to memory of 4684 3472 taskhost.exe 90 PID 3472 wrote to memory of 4684 3472 taskhost.exe 90 PID 4684 wrote to memory of 1732 4684 cmd.exe 93 PID 4684 wrote to memory of 1732 4684 cmd.exe 93 PID 4684 wrote to memory of 1732 4684 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aeb805ea2d57f2f9f49fa8ab1807ffda_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe2⤵
- Executes dropped EXE
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "cmd.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.execmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5aeb805ea2d57f2f9f49fa8ab1807ffda
SHA1d7344ba880c2f83a8e9c347f8d4c107e4d94088c
SHA256ec6f978e3825a28ffa1eeb50033da12f34cbe46c6629728a51a562aa13a996a8
SHA512e77be5d47ccab956243947b9f38c174c4c128c2ded0f85e25babd365c670d7a5b04bec8ca9295b398bd14313bfade994d908c77c7f697ef2a3298604fde7d1d4