Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe
-
Size
583KB
-
MD5
b4a698ebdf4225fe62b22917e607265c
-
SHA1
641fd9ee715c2777b2b7d9bfd3657c41fbf2e9d0
-
SHA256
1c50f00eacf16bc5c4f77c97910e56391a29a532a95bcaf7d8910563f30f2676
-
SHA512
6ab02418b1cd39db60da1985ca5e69c7b77f1897a6546f18ca2157b1d440c1497cd7550e652d95b83745a91d7131a7a72f8bc1df917947be61e8ee32c66c9588
-
SSDEEP
12288:+FNEGdAYnaj+S1OlEjUdNAgv4M5b4bIzdsTX0ET+znl2Z59Pqd:1AAYn8xiEjUdOgvHbGIzdsTXZO6E
Malware Config
Signatures
-
Executes dropped EXE 20 IoCs
pid Process 1412 Microsoft Update 1828 Microsoft Update 3016 Microsoft Update 4884 Microsoft Update 2088 Microsoft Update 2000 Microsoft Update 2400 Microsoft Update 3508 Microsoft Update 1956 Microsoft Update 4108 Microsoft Update 3812 Microsoft Update 1268 Microsoft Update 3212 Microsoft Update 4236 Microsoft Update 1092 Microsoft Update 432 Microsoft Update 4532 Microsoft Update 4188 Microsoft Update 3508 Microsoft Update 3616 Microsoft Update -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 1172 set thread context of 1476 1172 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 84 PID 1412 set thread context of 1828 1412 Microsoft Update 86 PID 3016 set thread context of 4884 3016 Microsoft Update 99 PID 2088 set thread context of 2000 2088 Microsoft Update 102 PID 2400 set thread context of 3508 2400 Microsoft Update 105 PID 1956 set thread context of 4108 1956 Microsoft Update 108 PID 3812 set thread context of 1268 3812 Microsoft Update 111 PID 3212 set thread context of 4236 3212 Microsoft Update 113 PID 1092 set thread context of 432 1092 Microsoft Update 115 PID 4532 set thread context of 4188 4532 Microsoft Update 121 PID 3508 set thread context of 3616 3508 Microsoft Update 123 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 1476 1172 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 84 PID 1172 wrote to memory of 1476 1172 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 84 PID 1172 wrote to memory of 1476 1172 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 84 PID 1172 wrote to memory of 1476 1172 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 84 PID 1172 wrote to memory of 1476 1172 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 84 PID 1476 wrote to memory of 1412 1476 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 85 PID 1476 wrote to memory of 1412 1476 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 85 PID 1476 wrote to memory of 1412 1476 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 85 PID 1412 wrote to memory of 1828 1412 Microsoft Update 86 PID 1412 wrote to memory of 1828 1412 Microsoft Update 86 PID 1412 wrote to memory of 1828 1412 Microsoft Update 86 PID 1412 wrote to memory of 1828 1412 Microsoft Update 86 PID 1412 wrote to memory of 1828 1412 Microsoft Update 86 PID 1828 wrote to memory of 3016 1828 Microsoft Update 98 PID 1828 wrote to memory of 3016 1828 Microsoft Update 98 PID 1828 wrote to memory of 3016 1828 Microsoft Update 98 PID 3016 wrote to memory of 4884 3016 Microsoft Update 99 PID 3016 wrote to memory of 4884 3016 Microsoft Update 99 PID 3016 wrote to memory of 4884 3016 Microsoft Update 99 PID 3016 wrote to memory of 4884 3016 Microsoft Update 99 PID 3016 wrote to memory of 4884 3016 Microsoft Update 99 PID 4884 wrote to memory of 2088 4884 Microsoft Update 101 PID 4884 wrote to memory of 2088 4884 Microsoft Update 101 PID 4884 wrote to memory of 2088 4884 Microsoft Update 101 PID 2088 wrote to memory of 2000 2088 Microsoft Update 102 PID 2088 wrote to memory of 2000 2088 Microsoft Update 102 PID 2088 wrote to memory of 2000 2088 Microsoft Update 102 PID 2088 wrote to memory of 2000 2088 Microsoft Update 102 PID 2088 wrote to memory of 2000 2088 Microsoft Update 102 PID 2000 wrote to memory of 2400 2000 Microsoft Update 104 PID 2000 wrote to memory of 2400 2000 Microsoft Update 104 PID 2000 wrote to memory of 2400 2000 Microsoft Update 104 PID 2400 wrote to memory of 3508 2400 Microsoft Update 105 PID 2400 wrote to memory of 3508 2400 Microsoft Update 105 PID 2400 wrote to memory of 3508 2400 Microsoft Update 105 PID 2400 wrote to memory of 3508 2400 Microsoft Update 105 PID 2400 wrote to memory of 3508 2400 Microsoft Update 105 PID 3508 wrote to memory of 1956 3508 Microsoft Update 107 PID 3508 wrote to memory of 1956 3508 Microsoft Update 107 PID 3508 wrote to memory of 1956 3508 Microsoft Update 107 PID 1956 wrote to memory of 4108 1956 Microsoft Update 108 PID 1956 wrote to memory of 4108 1956 Microsoft Update 108 PID 1956 wrote to memory of 4108 1956 Microsoft Update 108 PID 1956 wrote to memory of 4108 1956 Microsoft Update 108 PID 1956 wrote to memory of 4108 1956 Microsoft Update 108 PID 4108 wrote to memory of 3812 4108 Microsoft Update 110 PID 4108 wrote to memory of 3812 4108 Microsoft Update 110 PID 4108 wrote to memory of 3812 4108 Microsoft Update 110 PID 3812 wrote to memory of 1268 3812 Microsoft Update 111 PID 3812 wrote to memory of 1268 3812 Microsoft Update 111 PID 3812 wrote to memory of 1268 3812 Microsoft Update 111 PID 3812 wrote to memory of 1268 3812 Microsoft Update 111 PID 3812 wrote to memory of 1268 3812 Microsoft Update 111 PID 1268 wrote to memory of 3212 1268 Microsoft Update 112 PID 1268 wrote to memory of 3212 1268 Microsoft Update 112 PID 1268 wrote to memory of 3212 1268 Microsoft Update 112 PID 3212 wrote to memory of 4236 3212 Microsoft Update 113 PID 3212 wrote to memory of 4236 3212 Microsoft Update 113 PID 3212 wrote to memory of 4236 3212 Microsoft Update 113 PID 3212 wrote to memory of 4236 3212 Microsoft Update 113 PID 3212 wrote to memory of 4236 3212 Microsoft Update 113 PID 4236 wrote to memory of 1092 4236 Microsoft Update 114 PID 4236 wrote to memory of 1092 4236 Microsoft Update 114 PID 4236 wrote to memory of 1092 4236 Microsoft Update 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 1108 "C:\Users\Admin\AppData\Local\Temp\b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 1128 "C:\Windows\SysWOW64\Microsoft Update"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 1092 "C:\Windows\SysWOW64\Microsoft Update"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 1088 "C:\Windows\SysWOW64\Microsoft Update"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 1092 "C:\Windows\SysWOW64\Microsoft Update"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 1092 "C:\Windows\SysWOW64\Microsoft Update"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 1084 "C:\Windows\SysWOW64\Microsoft Update"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 1096 "C:\Windows\SysWOW64\Microsoft Update"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:432 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 1092 "C:\Windows\SysWOW64\Microsoft Update"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4532 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4188 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 1092 "C:\Windows\SysWOW64\Microsoft Update"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
583KB
MD5b4a698ebdf4225fe62b22917e607265c
SHA1641fd9ee715c2777b2b7d9bfd3657c41fbf2e9d0
SHA2561c50f00eacf16bc5c4f77c97910e56391a29a532a95bcaf7d8910563f30f2676
SHA5126ab02418b1cd39db60da1985ca5e69c7b77f1897a6546f18ca2157b1d440c1497cd7550e652d95b83745a91d7131a7a72f8bc1df917947be61e8ee32c66c9588