Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
bd46293e1dc0d63da88c3a151662e7ee_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd46293e1dc0d63da88c3a151662e7ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd46293e1dc0d63da88c3a151662e7ee_JaffaCakes118.exe
-
Size
567KB
-
MD5
bd46293e1dc0d63da88c3a151662e7ee
-
SHA1
d24e2579d51f72395c63f1b58cc803908fd47b7a
-
SHA256
ce5353d555db90731fa88b241f0cbca3af458243955de96c631b774280250e88
-
SHA512
af562c720a679ac249aa035bf6bd92bf5633c354481f2f12ff3229e0aa4b157a259514fbfbe31deb98d719412f27b04b55fa2cd5377832a9feb1f5c426d765d2
-
SSDEEP
12288:0PfUbGcThaP29kDD6iLf1QZ6A3wsPT1VqnBgGX7Ux8L4k7VWvM2q7f:0Pf9cThaekv6ixQZYk1gnBgGXvL4aVgK
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4548 irsetup.exe 5820 Srng.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Srng = "C:\\Program Files (x86)\\Srng\\Srng.exe" irsetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\ieshnv.dat irsetup.exe File created C:\Program Files (x86)\ieshnv.lng irsetup.exe File created C:\Program Files (x86)\ieshnv.bmp irsetup.exe File opened for modification C:\Program Files (x86)\ieshnv.ini irsetup.exe File opened for modification C:\Program Files\Srng\SRNG.LOCK Srng.exe File opened for modification C:\Program Files (x86)\Srng\Srng.exe irsetup.exe File created C:\Program Files (x86)\Srng\Srng.exe irsetup.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\iun6002.exe irsetup.exe File created C:\Windows\svchost.exe irsetup.exe File opened for modification C:\Windows\svchost.exe irsetup.exe File created C:\Windows\iun6002.exe irsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd46293e1dc0d63da88c3a151662e7ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irsetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Srng.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4548 irsetup.exe 4548 irsetup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4548 irsetup.exe 4548 irsetup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4756 wrote to memory of 4548 4756 bd46293e1dc0d63da88c3a151662e7ee_JaffaCakes118.exe 84 PID 4756 wrote to memory of 4548 4756 bd46293e1dc0d63da88c3a151662e7ee_JaffaCakes118.exe 84 PID 4756 wrote to memory of 4548 4756 bd46293e1dc0d63da88c3a151662e7ee_JaffaCakes118.exe 84 PID 4548 wrote to memory of 5820 4548 irsetup.exe 93 PID 4548 wrote to memory of 5820 4548 irsetup.exe 93 PID 4548 wrote to memory of 5820 4548 irsetup.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd46293e1dc0d63da88c3a151662e7ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd46293e1dc0d63da88c3a151662e7ee_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\irsetup.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Program Files (x86)\Srng\Srng.exe"C:\Program Files (x86)\Srng\Srng.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5adb0bce8e32c0ff1b720fc9e9a2ae2c4
SHA112b799fe1e03cea03367ba00bcb44e338fce5156
SHA2568d9b21a2cfe835116e05aeae474b03a546f010f4b10ab991be4149d6cfc78b13
SHA512d780c764749469b28e66f8c777f337fc2fe8d5c055d5b1c8ef972520f0d76d2d5d8bd8301baea32ec4db1d83f4afa122afbf5509fad2fe3edb15887e51be4ddc
-
Filesize
17KB
MD520c61ffe29bf73f40abb855b8fb4cc84
SHA108ec4bd0eec92a9c3fe85b013c464bf93ea6a235
SHA256e6031617b8677e5936f1673b1e669b7be7d082632410353df33eb009de0e03d3
SHA51267a23974d3456e8f2f30057f054c7ebc5b78a3e5484d83e2c35e803870542b7db31e66f6669fd0918a3f6da2157372c4f4cab480e7b312f0129f02c91e239f45
-
Filesize
7KB
MD5e29a24e189e95681bb41f73c16747fd8
SHA1e9269bb9cb6f2b700fc78f92066f31b15a9c5c2a
SHA2563973d354045be781eabf9114772fe2e5e96d1e557793de10c914d901b16e8c09
SHA5124c6db25e04acb8349da29249f712b20c217d792e6d5fd40af9b398e2617d5168ef0afc2505a05b0833b90165d5e5eaf2e98d1821e855a99fc7833de52154ad94
-
Filesize
35KB
MD5f4cd73d49a4333bc49365e23f6bb2a95
SHA1db4a052a894003e3aa87280295ede7bb43a39ec2
SHA25627159615b411989303bc144e061cac29c1b09f76c382953323083cd9b3e74b96
SHA5129204c4b06c2c11e4efcc3a15c3a7fc03ed62bc934358c3d84ce4ef9babe0025d5d71d878a3dbfae6b39befab8792236fe9ad5e3eead8f48c3861062c4beec796
-
Filesize
720KB
MD5456462905091db042141487fe030e3c9
SHA1bb57b4850528c3c8d9bf159fb5b9f414ddc7d5d7
SHA256a93dc5e28d74ef40dd5d694aff7fb5f24c27dac4b59adae008cfdc5ca65587b0
SHA512fdd82c126189454352b44c756be06e3e93ee26a93b56d99c3eb5254cac3f6d6ed71556765b76e65bd75efad461972044ce829443c006fc0816a28f7b4493296f
-
Filesize
119B
MD503bb733b500ef1f41487b6b313b875be
SHA1d1cddbbc521936005614e37c50b2181fe17bffac
SHA2562f126be279a3f4b5582861198004b94e0f51aac70cf1ea214b8476e4cb667e03
SHA51236f3f88d96f8a66f8d4b2ce65773754b054a1e2c21259596c61d509ea878040bc3308ba34d3f772b1f2d79ee74851a6f398a08eac01fcb1a28ae125976d26c2c
-
Filesize
15KB
MD5cedffa2264d312a7ca515e64ff34b814
SHA13f2c492765f8e6f50ec8b0d3580a8b81f2fe108c
SHA256b13b8d36a80294fb22f2e166a307f6dab26cef2b7f4be3067571731d7cdf424a
SHA5123c42ba97bac9aefeec0c1190c9375893eafb8f230339b141a1fdacb51ff994f9d362988273a53144e689f90ef62dbee0a2063e49523d73ce55a6e72673f9b638