Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe
-
Size
17KB
-
MD5
b54c74f76fd2324c6c12f0f6d9bf34c8
-
SHA1
9007cb8db2e391ee0f0dbaaf81d771f8792c1210
-
SHA256
2a0dc506712a92c833944dac47bcb7b3a5da3a6973baed7bc0a0f00b5065e0b2
-
SHA512
b2c30f6e8be0186ad9eeaf9d0802ac39d6b11699c8af4f40e08c385e559928435aeabedde37a50ee4b39c86427a02eb8b120a2414076d6e687f311f67ab8412c
-
SSDEEP
384:mx1W/W4aBGOuCRSrMbRqCtmQmb19dokArIw6gMD8FEIYOnZaG65Bi:KTnRr/t6b1PokFwD+ZZOZ85Bi
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\28968A84\ImagePath = "C:\\Windows\\system32\\AB320186.EXE -k" b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2512 AB320186.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\AB320186.EXE AB320186.EXE File created C:\Windows\SysWOW64\B39BCDA4.DLL AB320186.EXE File created C:\Windows\SysWOW64\delme.bat b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe File created C:\Windows\SysWOW64\AB320186.EXE b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\AB320186.EXE b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AB320186.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2512 AB320186.EXE 2512 AB320186.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 4576 b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4576 wrote to memory of 2552 4576 b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe 99 PID 4576 wrote to memory of 2552 4576 b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe 99 PID 4576 wrote to memory of 2552 4576 b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b54c74f76fd2324c6c12f0f6d9bf34c8_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\delme.bat2⤵
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Windows\SysWOW64\AB320186.EXEC:\Windows\SysWOW64\AB320186.EXE -k1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5b54c74f76fd2324c6c12f0f6d9bf34c8
SHA19007cb8db2e391ee0f0dbaaf81d771f8792c1210
SHA2562a0dc506712a92c833944dac47bcb7b3a5da3a6973baed7bc0a0f00b5065e0b2
SHA512b2c30f6e8be0186ad9eeaf9d0802ac39d6b11699c8af4f40e08c385e559928435aeabedde37a50ee4b39c86427a02eb8b120a2414076d6e687f311f67ab8412c
-
Filesize
239B
MD55e6a0c372a9d50e4b42d107b07a4b7ac
SHA1a71542ee2228ae91a83ceffcd60bb51e4afd7049
SHA25689f93668777bfc571b4a44f6bc2552918a4d13ab5e2d4a3a49c328b9cb8e4359
SHA5120d32239e5503d1c0e46b33086ac077e8a408f7081bfba10827c8b4a61c9b316888c460f3a08b9fd0acc1b5da65e615329cee4a430e838cc18e89b790a6f069bb