Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe
-
Size
182KB
-
MD5
b389face833ea8e03cd134b6b3e061d3
-
SHA1
59033e2a0f173a2e523368db10139e1f4059dba6
-
SHA256
74cb115c00d95ad8b9d31498252638036f0117776dc81698e85e18b59d8d7bd6
-
SHA512
0f942c058549f20535f52489f454ccd85753968a10193a0fc00257b593ef4ef849fb46ca1924e9bc7c410352e2749045b8f20b85e922a34096c5a6ebc26fb6bb
-
SSDEEP
3072:YrOscJZSn/s5UiJSCtkOMP3vZpCIcArNS+h3FtqaZS8aQA50Ax8KUsZOepqoY:rqs5Ugg3vZpvrpZP4dQAy+8KUOOes
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1120-2-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/2212-12-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/2212-13-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/2212-15-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/1120-16-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/2156-83-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/1120-84-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/1120-193-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/1120-194-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2212 1120 b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe 85 PID 1120 wrote to memory of 2212 1120 b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe 85 PID 1120 wrote to memory of 2212 1120 b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe 85 PID 1120 wrote to memory of 2156 1120 b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe 90 PID 1120 wrote to memory of 2156 1120 b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe 90 PID 1120 wrote to memory of 2156 1120 b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b06583e02ece7182e7517ce552079411
SHA146c78b659b64d4a2c3f4fd05c9d7e734578c89a4
SHA256bf3b9b5545439a6917e79eba1a2ab5cc832b6fd77bf207100f1f3ff231f696e2
SHA512e7def45cad358237fafff383be491886006c6a68321ffd509dc18a6fa5a81687afd358ae154910522b644cc8702ef93aaf87acf0f26e30cdf29070b0458c213c
-
Filesize
600B
MD52e87cdee2e5f49e315423ae7f0415dc8
SHA135b6333098ce698abf225bffe5cb719da9447837
SHA2566e0f11dd31e1b565115d5b8cf8cbcf5968d68cde6b9ef23ca51f71d6cef34782
SHA512c4cc0599a5480d859c75cf45beb8d72b98c5f442dfa986802fec62edf72f1c71c850cc29433f290bb5b8ca774b9d3dc0c892b9c5e36758fb0d855beb8d9c1ca0
-
Filesize
996B
MD5026507a9857847d11fe7d04c6bf7605e
SHA1a1baea093c396a0ca53d14244891462a57b57cb5
SHA256b9d7bb288f78f6b8b682deb4b4c7eb6b53aa0bcfa4977a9a41a66f747e512702
SHA5124807529d469e5a55dcadf1da8ef355196124b2966896387e7b33ac91b416eff09478629d9317b5b6ea92cc10afbac58a07ff7ef6c329888660ae65f4239ff79a