Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe
-
Size
14KB
-
MD5
b6887c970065ae7b3a49d41fb98e1232
-
SHA1
c7bd28fbd62fe21ded605cf0b2730508503890a8
-
SHA256
7ab75cd48171a95eb961148f28d63055af2dc623938605ed6409d5c2512637ec
-
SHA512
68f64dc61ac57eb2f63f698e92fbc1f6a5d2eb7c09a589aab2e1880854a8a9f108b716acfc28f3507c377af361b0f7f92d8c990239517c7f73005ecafdc4cae8
-
SSDEEP
384:OlcpOorUP0vo3WwkeZ+GYxbrEl2/bWvDPPi:0cp5dQGzGY5mUijPi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1652 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 winsto.exe -
Loads dropped DLL 2 IoCs
pid Process 2220 b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe 2220 b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Rescue System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winsto.exe" b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Rescue System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winsto.exe" winsto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Display Inline Videos = "no" winsto.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" winsto.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Display Inline Images = "no" winsto.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2648 2220 b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2648 2220 b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2648 2220 b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2648 2220 b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe 31 PID 2220 wrote to memory of 1652 2220 b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe 32 PID 2220 wrote to memory of 1652 2220 b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe 32 PID 2220 wrote to memory of 1652 2220 b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe 32 PID 2220 wrote to memory of 1652 2220 b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\winsto.exeC:\Users\Admin\AppData\Local\Temp\winsto.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:2648
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7hjhffd.bat" "C:\Users\Admin\AppData\Local\Temp\b6887c970065ae7b3a49d41fb98e1232_JaffaCakes118.exe""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51B
MD5b89a6400c207efc86cb2af6b7ea9a346
SHA1f9f957d91991f88a7b0e2e9b1034e14b20a6866f
SHA25694a80174fd3fe86f55bf71ff67047d910925fe5aa0ce7a04a5cd9060a12e8af0
SHA512b03ef8435e82a2d301f31dbbcbdbafb5700ec6ec4b1ff0de26a525add9c160f595a952193d7bdc9fb28f1237bc1d4c3499cde775df77e94134c308247963b64d
-
Filesize
14KB
MD5b6887c970065ae7b3a49d41fb98e1232
SHA1c7bd28fbd62fe21ded605cf0b2730508503890a8
SHA2567ab75cd48171a95eb961148f28d63055af2dc623938605ed6409d5c2512637ec
SHA51268f64dc61ac57eb2f63f698e92fbc1f6a5d2eb7c09a589aab2e1880854a8a9f108b716acfc28f3507c377af361b0f7f92d8c990239517c7f73005ecafdc4cae8