Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe
-
Size
104KB
-
MD5
b18a74eb0b92b73ef3a791aa28aa5fb3
-
SHA1
83afe7edd94038b995638f1ad0152314e0505c6b
-
SHA256
99a960c177f28c85b58ad7b4f717c3dda78a1911d7cd2cac6c7d4684deea382b
-
SHA512
0453ae78b89e11c616b175d81c5a4899eb6ad09619f7a8ffea1c80dbc37c67eb832308423797a99d3c7b59b1ab8690f5f69fc22d5274f545522f53189150a854
-
SSDEEP
1536:7iq+mQ+3SuUDKH6WPuX6ufe7ojufVtVH9l+hU:4m/qxGoyfFShU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3000 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 280 NTdHcP.exe -
Loads dropped DLL 2 IoCs
pid Process 2052 b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe 2052 b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\NTdHcP.exe b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NTdHcP.exe b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NTdHcP.exe NTdHcP.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Deleteme.bat b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2052 wrote to memory of 280 2052 b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe 30 PID 2052 wrote to memory of 280 2052 b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe 30 PID 2052 wrote to memory of 280 2052 b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe 30 PID 2052 wrote to memory of 280 2052 b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe 30 PID 2052 wrote to memory of 3000 2052 b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe 31 PID 2052 wrote to memory of 3000 2052 b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe 31 PID 2052 wrote to memory of 3000 2052 b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe 31 PID 2052 wrote to memory of 3000 2052 b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b18a74eb0b92b73ef3a791aa28aa5fb3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\NTdHcP.exeC:\Windows\system32\NTdHcP.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:280
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Deleteme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD50b5c652f5115c27793f3f345d24f3dd9
SHA1f7aa0af04d6cf9e511ca1b85444161ffc10c93e9
SHA25668e34de46a3e625d42173e1e2c2e3ef0783518b0e619382d4a0dfddc342c1ff6
SHA5129d9283ac696fc549b47fbb9225fdfebf1905ed62a78e40374c401212491d1c0d32a17e432f1ea3f4de83a0d92e58ecb3abcdc6cdf4228b528d1952f7525b2ed8
-
Filesize
104KB
MD5b18a74eb0b92b73ef3a791aa28aa5fb3
SHA183afe7edd94038b995638f1ad0152314e0505c6b
SHA25699a960c177f28c85b58ad7b4f717c3dda78a1911d7cd2cac6c7d4684deea382b
SHA5120453ae78b89e11c616b175d81c5a4899eb6ad09619f7a8ffea1c80dbc37c67eb832308423797a99d3c7b59b1ab8690f5f69fc22d5274f545522f53189150a854