Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe
-
Size
356KB
-
MD5
b1f48496d01f9bbb223e8374003a7396
-
SHA1
5754c20c97f7a9fc6e4e9bfd81f24a8edf2c8792
-
SHA256
9c0c96f9f29d774a895a3e47246979185092a3b80730fef86f0a9e6ee811e05d
-
SHA512
67789c690d7319bf2eed860db96bca71d65cf1dc96570f1a6366fd2120404df6e429e85a7bf450eb3277aa1ae352d6b5ff355b5c9965031d249e3a69a13c5377
-
SSDEEP
6144:7vbx8gINUlaYTP0WHrXwSZzJvx8kPQ9gj631LCSN6G:7DINUJPzHTwox8KXj61/NL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2688 6f4d3hJ7m0Qe.exe -
Executes dropped EXE 2 IoCs
pid Process 2636 6f4d3hJ7m0Qe.exe 2688 6f4d3hJ7m0Qe.exe -
Loads dropped DLL 5 IoCs
pid Process 2148 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 2148 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 2148 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 2636 6f4d3hJ7m0Qe.exe 2688 6f4d3hJ7m0Qe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\NXffELr9wBW = "C:\\ProgramData\\27amM8VMes1R\\6f4d3hJ7m0Qe.exe" b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1296 set thread context of 2148 1296 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 30 PID 2636 set thread context of 2688 2636 6f4d3hJ7m0Qe.exe 32 PID 2688 set thread context of 2776 2688 6f4d3hJ7m0Qe.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f4d3hJ7m0Qe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f4d3hJ7m0Qe.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2148 1296 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 30 PID 1296 wrote to memory of 2148 1296 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 30 PID 1296 wrote to memory of 2148 1296 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 30 PID 1296 wrote to memory of 2148 1296 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 30 PID 1296 wrote to memory of 2148 1296 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 30 PID 1296 wrote to memory of 2148 1296 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2636 2148 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2636 2148 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2636 2148 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2636 2148 b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe 31 PID 2636 wrote to memory of 2688 2636 6f4d3hJ7m0Qe.exe 32 PID 2636 wrote to memory of 2688 2636 6f4d3hJ7m0Qe.exe 32 PID 2636 wrote to memory of 2688 2636 6f4d3hJ7m0Qe.exe 32 PID 2636 wrote to memory of 2688 2636 6f4d3hJ7m0Qe.exe 32 PID 2636 wrote to memory of 2688 2636 6f4d3hJ7m0Qe.exe 32 PID 2636 wrote to memory of 2688 2636 6f4d3hJ7m0Qe.exe 32 PID 2688 wrote to memory of 2776 2688 6f4d3hJ7m0Qe.exe 33 PID 2688 wrote to memory of 2776 2688 6f4d3hJ7m0Qe.exe 33 PID 2688 wrote to memory of 2776 2688 6f4d3hJ7m0Qe.exe 33 PID 2688 wrote to memory of 2776 2688 6f4d3hJ7m0Qe.exe 33 PID 2688 wrote to memory of 2776 2688 6f4d3hJ7m0Qe.exe 33 PID 2688 wrote to memory of 2776 2688 6f4d3hJ7m0Qe.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1f48496d01f9bbb223e8374003a7396_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\ProgramData\27amM8VMes1R\6f4d3hJ7m0Qe.exe"C:\ProgramData\27amM8VMes1R\6f4d3hJ7m0Qe.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\ProgramData\27amM8VMes1R\6f4d3hJ7m0Qe.exe"C:\ProgramData\27amM8VMes1R\6f4d3hJ7m0Qe.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe"C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe" /i:26885⤵PID:2776
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD5b1f48496d01f9bbb223e8374003a7396
SHA15754c20c97f7a9fc6e4e9bfd81f24a8edf2c8792
SHA2569c0c96f9f29d774a895a3e47246979185092a3b80730fef86f0a9e6ee811e05d
SHA51267789c690d7319bf2eed860db96bca71d65cf1dc96570f1a6366fd2120404df6e429e85a7bf450eb3277aa1ae352d6b5ff355b5c9965031d249e3a69a13c5377