Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe
-
Size
139KB
-
MD5
b23e4e7059f6dae40929a993b193b65c
-
SHA1
836837efd7f88cc5fecf9982c9a4c7d1a8076cb9
-
SHA256
a1c5df9639b37e13b920fed8e2be0dd9b59cc17f768ff90854e58f8c65a76bbf
-
SHA512
333f35411fc022c4db609c2b30af1ef8b1d6a5bd7e3100a2ef1f5bccbe192a68795eece1c4d60940f4583a5e58c35063e88a407bb0e21414a2bbdbe3e0625720
-
SSDEEP
3072:Zhkv3chrPUjnAuvLdSwVqD33zJvAMVksDp:rkvmDUjRh9qT5AMVk
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\help\B41346EFA848.dll b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe File created C:\Windows\help\B41346EFA848.dll b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\ = "SSUUDL" b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ = "C:\\Windows\\help\\B41346EFA848.dll" b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ThreadingModel = "Apartment" b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765} b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeRestorePrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeRestorePrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeRestorePrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeRestorePrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeRestorePrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeBackupPrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeRestorePrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeRestorePrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeRestorePrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeRestorePrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe Token: SeRestorePrivilege 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2104 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe 30 PID 1064 wrote to memory of 2104 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe 30 PID 1064 wrote to memory of 2104 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe 30 PID 1064 wrote to memory of 2104 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe 30 PID 1064 wrote to memory of 2820 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe 33 PID 1064 wrote to memory of 2820 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe 33 PID 1064 wrote to memory of 2820 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe 33 PID 1064 wrote to memory of 2820 1064 b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b23e4e7059f6dae40929a993b193b65c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵
- System Location Discovery: System Language Discovery
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD579b3a75b49ae56b22319c087613ce80f
SHA13281afb48370e22e116a83f3aad86a88f566df45
SHA256faa1091a5605f1123f51e1c004ac4e8bd9bf1a5ca96f6aebe2e0a655f3c02f73
SHA512b49e1d9598eca6513279e0bbe95bc0cdb30d544ee1176fd05719b5584ebfa5110eb5c2427fa45784ab632072d61960f9d8079de175ed2f8654826ee7426e6875
-
Filesize
63B
MD54784169ad385e22ef3f7090e6ee34c59
SHA1e1be6ac7b1387805624cc988878cd3685f198177
SHA2564c94c833b247a319e192767f248bace48370f99dbc702565ece92f1f21198cd2
SHA512467d9c8001636b4c29803d1982c5d6f7e248bb0ca0960ebb7979af080c0831cdb817e3c2422443c322230fa654dfeb4a43a89a64c5c6b67e82e8820da545255a
-
Filesize
126KB
MD55fbb463f8aa72697a85b6f949ea51adb
SHA17c7f77f5b604f11d1be4b51aa35616132b4f8c38
SHA256357a856d738e31487d12a9d08bb088e28b1c997866e45985b8a1f793721f94c0
SHA512b8f3f17885924b1261b0a77152f8fffdcae94c688fd212737c70ad113fbdb23d2e30d2fd9c14e1492d55f657627013bf59a7be876c063cadab399f1e67c94adb