Analysis
-
max time kernel
141s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe
-
Size
649KB
-
MD5
b1c48a02fd8fb5e97b5d028fb0e5381d
-
SHA1
e4dc0eeff16b3e08edfb6e9efdcb1761d77622ae
-
SHA256
667c2b1716fc5ec2978eda34181afe7f35dc2564b9d9d54506f0b12eb6130ac9
-
SHA512
3dbe02aff2b6f62ee751347891843f96abb0bd83a8d5853430894b4ac42d32c5bbfaee2fc59773a297bcb22276a3a37190597a16e5175256c1a521f489e4718e
-
SSDEEP
12288:ua3wloHCSUXD5cnEf5BequKDqF3Z4mxx4DqVTVOCZJb:uDMU+ERB9uKWQmXfVTz3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2348 1.exe 2972 Hacker.com.cn.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe 2024 b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 1.exe File opened for modification C:\Windows\Hacker.com.cn.exe 1.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2348 1.exe Token: SeDebugPrivilege 2972 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2348 2024 b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe 30 PID 2024 wrote to memory of 2348 2024 b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe 30 PID 2024 wrote to memory of 2348 2024 b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe 30 PID 2024 wrote to memory of 2348 2024 b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe 30 PID 2972 wrote to memory of 1112 2972 Hacker.com.cn.exe 32 PID 2972 wrote to memory of 1112 2972 Hacker.com.cn.exe 32 PID 2972 wrote to memory of 1112 2972 Hacker.com.cn.exe 32 PID 2972 wrote to memory of 1112 2972 Hacker.com.cn.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1c48a02fd8fb5e97b5d028fb0e5381d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD57363854f89e8e80c0e735db9fb96c38e
SHA16baf9e9d108ff5954fbe1962a088e1e8e9134f5f
SHA25697209518f3411a0e046ab5e064084c1750d5967ccdf1a42ec779a0744e4eca3a
SHA512dc20f6d12246c1388e0d8e0737a5a61597d60fb06138856696f435563c22c3e23a60b974f9373eabab0f0276aebaf00441e2fc9b7ee10444d6dfca5236a2674b