Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe
-
Size
320KB
-
MD5
b7b2a0f44ebede27ccfce08544c75836
-
SHA1
7147489b11c5ae9bc1ab7364d897d539f35856b8
-
SHA256
9983d7fb57e771a26a20ac71b33c981b96ec583f4c4521d4de87aafbfff14c78
-
SHA512
10928f8f4b68f310d2fe810cc3e95370b3b544899de3ed6bec3441b70be2fdab95bd7f52f98bb4c34b8bc80877875755da082c398ad10b0a82737185805dfc77
-
SSDEEP
6144:N+kht377UyZ/CcmzRmwkCLSvGlTceQUtloiGnB3jtlS3XRDeuyrNkiH6:YW37JqUwkZGEUDYZGXRDnW6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 532 jGo16601mDgBk16601.exe -
Executes dropped EXE 1 IoCs
pid Process 532 jGo16601mDgBk16601.exe -
Loads dropped DLL 2 IoCs
pid Process 2688 b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe 2688 b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2688-2-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2688-0-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2688-10-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2688-9-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2688-32-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/532-30-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/532-35-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/532-45-0x0000000000400000-0x00000000004B9000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\jGo16601mDgBk16601 = "C:\\ProgramData\\jGo16601mDgBk16601\\jGo16601mDgBk16601.exe" jGo16601mDgBk16601.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jGo16601mDgBk16601.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main jGo16601mDgBk16601.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2688 b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2688 b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe Token: SeDebugPrivilege 532 jGo16601mDgBk16601.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 532 jGo16601mDgBk16601.exe 532 jGo16601mDgBk16601.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 532 2688 b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe 30 PID 2688 wrote to memory of 532 2688 b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe 30 PID 2688 wrote to memory of 532 2688 b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe 30 PID 2688 wrote to memory of 532 2688 b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\ProgramData\jGo16601mDgBk16601\jGo16601mDgBk16601.exe"C:\ProgramData\jGo16601mDgBk16601\jGo16601mDgBk16601.exe" "C:\Users\Admin\AppData\Local\Temp\b7b2a0f44ebede27ccfce08544c75836_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD587973405edc24b8681902fe8fe5c6887
SHA162441bea3294fe0488ea082f79bdb8f8fbdcc414
SHA256ab88a7bb9514f171cd97e6eb0f4577631b76860417ce47ef6794fd0b26ea6dfa
SHA5124d9f9198053e67cc4673cd09a35c841736481a64f3ef7f8c3812b704d5dae7f2a57e3bcf2467b59ab19d9f439d5919faa60fe1e069037ea7fee1f19af1c9fe83
-
Filesize
320KB
MD5512e87dd8b09641ecd7c508b93891efd
SHA1c9db8d0663e85983713b665325094b3d1ae53ec8
SHA2566e479c616afaeb176a1a3b26eb4bd2cd75fc8e9823ad14487e4198dcadc9cbe6
SHA51201e91762b36f7833b3480cf307e6790e560c7c0f53f5ad9124c3b60334684dee2c9ef6c667ab04db756cacfd62becfa89fe6690eaae98b47f7bcbe720a281545
-
Filesize
192B
MD5dd935d99c1c957173a207298c6808e6f
SHA19c129b72d25ac89687714764215fd302f8c0fb6d
SHA25683a334d9f42765292ecb54ff0570f5ec386765f1e44bcae93d6f05372b367c50
SHA51291a16c48c44d94395f754ea424c7c4c289b88705c8a571871eb7ec7ca0368566da8fdb8de0b3f6b0de99c234b618d99acfbd36f3f4c02c37601a18893d78bbd7