Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe
-
Size
540KB
-
MD5
b7e109ee7f6fe678bf05360c49610c2b
-
SHA1
3890e10e8034ffa398b903570de3894020b6fac9
-
SHA256
124b627fa172de0752e48a68dba4d3c9dc5e38909abb276be0e60cea2e3e5355
-
SHA512
16242546a2bcfe19dbcd14a19b3a2212ca4c84b1e0180bd5e3448aebacb33b60928843fbd8a71487dbbe565176bef165d5c3909eedbbc20d20c06dc21f9077c2
-
SSDEEP
6144:7yH7xOc6H5c6HcT66vlmKhggtWKdC9UGy+DTPL1vMi3AYXZq/azNQXVMGhRfP4Um:7aqFlXTPhvHA7azeJ7P41ca0qctale9A
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4632 svchost.exe 1944 b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe 2612 svchost.exe -
Drops file in Program Files directory 38 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3032 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3032 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4556 wrote to memory of 4632 4556 b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe 84 PID 4556 wrote to memory of 4632 4556 b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe 84 PID 4556 wrote to memory of 4632 4556 b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe 84 PID 4632 wrote to memory of 1944 4632 svchost.exe 85 PID 4632 wrote to memory of 1944 4632 svchost.exe 85 PID 4632 wrote to memory of 1944 4632 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7e109ee7f6fe678bf05360c49610c2b_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2612
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c0 0x2f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD5444067f81b9d0728a2e7e58fdf1caf65
SHA18ca703284b5909142b38122c4a9b7340d2625b09
SHA256bd971a423b8aaace648157868b769b3a32cfeae53c558c35738a45d18f8be3bc
SHA51264300b32eb2415af050038c662ed0e56c604a8abe2992fcc9e2cb729cc64183c7e3ad7f1dbad72dc0410e406012761ba9dfbd2a5f0a57e3519c05b9fecefda76
-
Filesize
35KB
MD5345861f739ef259c33abc7ef49b81694
SHA13b6aff327d91e66a207c0557eac6ddefab104598
SHA256fc3220611aded768e37b125c4e4d5a8ffdbf7dfa8d8c19c07c7791b486457948
SHA5127b0aae948a594f29125a3e80f6c2b51421cda07f5ee4554538037f12b87d4b3937ee74fb400505efcd2a953c897a49d79d875148516dcef619c514251854dfad