Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 23:37
Static task
static1
Behavioral task
behavioral1
Sample
b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe
-
Size
154KB
-
MD5
b57f7afafc40fd8ee8a0312eea4382cd
-
SHA1
8ab00b5eb8607c7a04ddc881b2731728ca6a7167
-
SHA256
f8c1c23ace9dbcc7aec6e9fe47c2dd39ceea452af5d9ba1086e85ad31e93a8c0
-
SHA512
1a0c073d0d252302b6ec619f14f25fcf1f470854242c4c25eb9683aec8909f8e481b26df0a4d2f8148dbfba637515c78daa2a2e952dd39e60b1b1e68f34d35f2
-
SSDEEP
3072:3+hOPTdZ/ljsHm/svxTuhaCSzaCx0MDi7sfvyEFQimi5WEpk:3QKTdnsvx6SOe0MD4sfvyyBcgk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5004 avp.exe 2400 avp.exe -
Loads dropped DLL 2 IoCs
pid Process 1800 b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe 1800 b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\hvsound2.dll b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe File created C:\Windows\SysWOW64\delplme.bat b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5004 set thread context of 2400 5004 avp.exe 90 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\avp.exe b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 1800 b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1800 b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2400 5004 avp.exe 90 PID 5004 wrote to memory of 2400 5004 avp.exe 90 PID 5004 wrote to memory of 2400 5004 avp.exe 90 PID 5004 wrote to memory of 2400 5004 avp.exe 90 PID 5004 wrote to memory of 2400 5004 avp.exe 90 PID 1800 wrote to memory of 2160 1800 b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe 91 PID 1800 wrote to memory of 2160 1800 b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe 91 PID 1800 wrote to memory of 2160 1800 b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b57f7afafc40fd8ee8a0312eea4382cd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c delplme.bat2⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
C:\Windows\avp.exeC:\Windows\avp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\avp.exeC:\Windows\avp.exe2⤵
- Executes dropped EXE
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD5474efed1b518fc6ec40bd02e4488786e
SHA178f82a17d6891dc48907b4d05887302f47c451ee
SHA2561babdf62dfd456af216c0552494524b66baff0a0efecb0d607ed7ea42fcedacd
SHA51268d33b67db3c4b537078a81fbe7aecf86b338abc3ed25f12169807feb206efcf678efc327d91696cfc8aaf29b9a7ed8273743f894e2881abe177443bb6c8eb8a
-
Filesize
233KB
MD53c56d6f42f5a53e0a6b632390ed93c32
SHA15717b0a6690b5416ab0c658135be8f0b0c3965e5
SHA25694dbf1c71769616f7fb78b10f8a781b93b6206b800096a22da868945dfb13339
SHA5124572a6d897dd20c3046574da782a3c458187d198e79c52ea91b3c11631cc3ffd38ae80e8d9a7c18e0b9c4f301f9935d48415e72a7799ad4979bd011817d4f537
-
Filesize
21KB
MD5d96771acf8211756a9c1ea512575c79a
SHA14220273f68f65061abf8e1ac87f35364fa984c6c
SHA256d36d9c6b553e95820dde6a45f93ce0a186f77123b6c76fd5a2a6fb260ccc0fe5
SHA5123a631a72c0310fea6199aad6d9b726581afacbb6e1c1cdd87ae9825ab81de73806d7a9d56f22709f3830a2cbdd5a7afd7a9333373bfe4a07db2077326bd35b4b