Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe
-
Size
14KB
-
MD5
b3d29ddfe886d03db79136357770f5a4
-
SHA1
f45df5d205c8515f8c5648f3632901fedabd6420
-
SHA256
b7f599591f3ed049ad9ff9bda207db9a9b153e4906a177cd92ced70a687089ea
-
SHA512
d5b209f183c3941c550b15c77ff58cab7accc9be21638af9daa44abaa0fb9190a2c5f5d05e0dac73b5d62bd4866c2efc1f4ca690983b5b5d95417cb97110df4e
-
SSDEEP
384:MkmJPIC47SMsfxwzeRn4QEQHMLm8mnF9WU6/zWn:AJN47SikyymdrU6in
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\tkuufuot.dll = "{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}" b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2308 b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\tkuufuot.tmp b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tkuufuot.tmp b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tkuufuot.nls b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA} b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}\InProcServer32 b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}\InProcServer32\ = "C:\\Windows\\SysWow64\\tkuufuot.dll" b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}\InProcServer32\ThreadingModel = "Apartment" b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2308 b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2308 b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe 2308 b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe 2308 b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2784 2308 b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2784 2308 b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2784 2308 b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2784 2308 b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3d29ddfe886d03db79136357770f5a4_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\6097.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD52448394ed7ed1f78494ca56166eb09a5
SHA1234767563ce68ae485aa008c88da959d724040df
SHA25662315966f124fb064b459b3c2a3ba5ca52ca1abb0096f71fb1e1d7a5e6ed0399
SHA512cc66ff45af23e55c1bddef47f4c47b69ed76d8187d577277d064ce99ac7f57ad9b6055d80aeefbb8e351aaf8008ab199d382f6a29e3cae708f518e99c3c57173
-
Filesize
2.2MB
MD51179cefdd5d5e933247b99e782fdb1f6
SHA1306a776cc323a9ca06fc5aa408fcda3c402f4be9
SHA2563bbeca8fc9013c6813e731138eacaf5be605e19ebf169dbc954378e45904de30
SHA512eec4337f11606d9976115c62c8a3afa6be607e21389c76f2f69ad7dad31512ee455170792ea191bd8c97150d341070cea2dff843e770b704bf6fe317d46c2a12