Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe
-
Size
60KB
-
MD5
b52ce99e1702fe34ca062c3b85a208d4
-
SHA1
0908d73b1d51c163881b59022faa3306eacab22f
-
SHA256
afd8ec548112f3742829f145a51323cc75102fdbd0a4522bc2b772163d242099
-
SHA512
5146b6afc61edf4d55bf11de2b24e73a8bae604f066a6b6c8f0c48163e9cae8803c856cba44de724a71cc776485e12f7bfa70fab1d48e18dd802c17e38b678e2
-
SSDEEP
1536:Ak3eKNkTSdCS1isFqn+kVDX2FrsqtjEieir6rqAXiN3xOJ8yWkh:N3eVT89qzGFrftLorvXiHS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1380 service949.exe 2800 service949.exe -
Loads dropped DLL 2 IoCs
pid Process 2420 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 2420 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Reader Speed Launcher = "C:\\Users\\Admin\\AppData\\Roaming\\service949.exe" service949.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe Reader Speed Launcher = "C:\\Users\\Admin\\AppData\\Roaming\\service949.exe" service949.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: service949.exe File opened (read-only) \??\F: service949.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Adobe Reader Speed Launcher = "C:\\Users\\Admin\\AppData\\Roaming\\service949.exe" service949.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2316 set thread context of 2420 2316 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 30 PID 1380 set thread context of 2800 1380 service949.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service949.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service949.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2800 service949.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2420 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe Token: SeDebugPrivilege 2800 service949.exe Token: SeDebugPrivilege 2800 service949.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2420 2316 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2420 2316 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2420 2316 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2420 2316 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2420 2316 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2420 2316 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2420 2316 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2420 2316 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2420 2316 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 30 PID 2420 wrote to memory of 1380 2420 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 31 PID 2420 wrote to memory of 1380 2420 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 31 PID 2420 wrote to memory of 1380 2420 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 31 PID 2420 wrote to memory of 1380 2420 b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe 31 PID 1380 wrote to memory of 2800 1380 service949.exe 32 PID 1380 wrote to memory of 2800 1380 service949.exe 32 PID 1380 wrote to memory of 2800 1380 service949.exe 32 PID 1380 wrote to memory of 2800 1380 service949.exe 32 PID 1380 wrote to memory of 2800 1380 service949.exe 32 PID 1380 wrote to memory of 2800 1380 service949.exe 32 PID 1380 wrote to memory of 2800 1380 service949.exe 32 PID 1380 wrote to memory of 2800 1380 service949.exe 32 PID 1380 wrote to memory of 2800 1380 service949.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b52ce99e1702fe34ca062c3b85a208d4_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Roaming\service949.exe-n3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Roaming\service949.exe-n4⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5b52ce99e1702fe34ca062c3b85a208d4
SHA10908d73b1d51c163881b59022faa3306eacab22f
SHA256afd8ec548112f3742829f145a51323cc75102fdbd0a4522bc2b772163d242099
SHA5125146b6afc61edf4d55bf11de2b24e73a8bae604f066a6b6c8f0c48163e9cae8803c856cba44de724a71cc776485e12f7bfa70fab1d48e18dd802c17e38b678e2