Analysis
-
max time kernel
121s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe
-
Size
39KB
-
MD5
b34718a93207b8bb24fdf1eaf193c1c5
-
SHA1
1071b3b5f9a827c35d6a4a1622488efe059ac85b
-
SHA256
977002b6fb831c0ed1551656e277a3729938f8477c35863bb91b5a51bf9d0de9
-
SHA512
234a858335d445d735e72938fd2e260586632eb629f24cff27fb4cf43e71c65df77dc009d96838eb87195e0a4c0cd5f098192a26f550f85a107540fc678fcafe
-
SSDEEP
768:FdvbdxXQLIt4RwpQsxM81RJ7taJ0au0eOmN3E:FVXY14r1taSaPeJRE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2784 BCSSync.exe 2696 BCSSync.exe -
Loads dropped DLL 3 IoCs
pid Process 2156 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 2156 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 2784 BCSSync.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2672 set thread context of 2156 2672 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 30 PID 2784 set thread context of 2696 2784 BCSSync.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\Gb35ud2J.com b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2156 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 2696 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2156 2672 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2156 2672 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2156 2672 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2156 2672 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2156 2672 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2156 2672 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2156 2672 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2156 2672 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2156 2672 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2784 2156 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2784 2156 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2784 2156 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2784 2156 b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2696 2784 BCSSync.exe 32 PID 2784 wrote to memory of 2696 2784 BCSSync.exe 32 PID 2784 wrote to memory of 2696 2784 BCSSync.exe 32 PID 2784 wrote to memory of 2696 2784 BCSSync.exe 32 PID 2784 wrote to memory of 2696 2784 BCSSync.exe 32 PID 2784 wrote to memory of 2696 2784 BCSSync.exe 32 PID 2784 wrote to memory of 2696 2784 BCSSync.exe 32 PID 2784 wrote to memory of 2696 2784 BCSSync.exe 32 PID 2784 wrote to memory of 2696 2784 BCSSync.exe 32 PID 2696 wrote to memory of 2404 2696 BCSSync.exe 33 PID 2696 wrote to memory of 2404 2696 BCSSync.exe 33 PID 2696 wrote to memory of 2404 2696 BCSSync.exe 33 PID 2696 wrote to memory of 2404 2696 BCSSync.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\b34718a93207b8bb24fdf1eaf193c1c5_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5eb8ba065f4ec4d581c0f3493db3c3cc8
SHA17c1b3d4f5a82c98c47bcba6fa3f71b29d7e0265f
SHA256a6c43dc99d9db1d38fc6ffd683938738ca70cae314bb532b975efc56cee94b9b
SHA5126f2ece28aff9cdcb6d731579a2ee65b63c9fa0e71bc58e2f4eac486c86b5b28f7ec2aebd1e9dbd52a110345da1664961c95d5e1c021918d6358aa61599f6c27e