Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe
-
Size
46KB
-
MD5
b8835850e90d01a768d1f21187a1ce0f
-
SHA1
190166d943eccf210cb23c5ef674d1de483f820c
-
SHA256
0687821fa6741bdfa0da567e2013fbd566bca6ed8562f628ceb0f9c9c83905c3
-
SHA512
71808d70c2cec9b96ef9fe911330d54c4c875a6c16c8920303b1b17544ff222fe53ee1d10dbbb5298c5697d5c473a49634314d50060c3eb7fe03548c3c48ea4d
-
SSDEEP
768:ZlBBfhgAroQ/upHfuV6/t8kDwuKu/RYn/xb3EQuOIpUVAFYMq:ZvBfCkNuN2VKt8kDKU4xb3EyIq2FYMq
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\kusn33sd\ImagePath = "C:\\Windows\\system32\\kusn33sd.exe -j" b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2736 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3032 kusn33sd.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\KillMe.bat b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe File created C:\Windows\SysWOW64\kusn433sd3.dll kusn33sd.exe File created C:\Windows\SysWOW64\kusn33sd.exe b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\kusn33sd.exe b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe File created C:\Windows\SysWOW64\kusn33sd.exe kusn33sd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kusn33sd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2324 b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe 3032 kusn33sd.exe 3032 kusn33sd.exe 3032 kusn33sd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2736 2324 b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2736 2324 b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2736 2324 b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2736 2324 b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8835850e90d01a768d1f21187a1ce0f_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\KillMe.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\kusn33sd.exeC:\Windows\SysWOW64\kusn33sd.exe -j1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD520649b77eba8f3f4bf5763cc30629117
SHA1295d01b239bda9851dcaa1d9a848875908a700c3
SHA2563e8c58bdf6221ac2af55def0d00d0c349c69e4f86a589ba606355f27e0ecd1c0
SHA5121978aae7d094ad0769bb2d3708b441cb468c3c3e598d8e7a3adb64e100a95a2a5d9ca4867d39c129ba26f813a8bb81b2cd9519f58be6ad45ec1635ac737a7b16
-
Filesize
46KB
MD5b8835850e90d01a768d1f21187a1ce0f
SHA1190166d943eccf210cb23c5ef674d1de483f820c
SHA2560687821fa6741bdfa0da567e2013fbd566bca6ed8562f628ceb0f9c9c83905c3
SHA51271808d70c2cec9b96ef9fe911330d54c4c875a6c16c8920303b1b17544ff222fe53ee1d10dbbb5298c5697d5c473a49634314d50060c3eb7fe03548c3c48ea4d