Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 01:36
Behavioral task
behavioral1
Sample
b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe
-
Size
57KB
-
MD5
b9dbb1993e6cf4e394f0c4d2fb632106
-
SHA1
46a9e966b2e342c89bc989db1a3bf9b450900ffa
-
SHA256
1f3a784fe2e6a93ff2cfd0a9755743149e943025b9d2b78721a0c6b4d3149a3d
-
SHA512
ed5c446047c0a82e97ac53e2862092e1536ed9060d2ea3e5ea5c32af90493d537570ecfe890d2ce107a5181e7435bccace0f676f2b5432e940863c51da094d37
-
SSDEEP
768:KYA2juW3Xk9q6wYsaXaOP8T8Kz1FqnalLg2MSOcDriocgkClBU/17BJDshjVKp1M:nCBs6wYrQ4UlXimGvQBU/tBJDsbKpT
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\DBS.EXE" b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4288 DBS.EXE -
resource yara_rule behavioral2/memory/3976-0-0x0000000010000000-0x000000001002B000-memory.dmp upx behavioral2/files/0x00080000000234b0-3.dat upx behavioral2/memory/2028-5-0x0000000010000000-0x000000001002B000-memory.dmp upx behavioral2/memory/2028-7-0x0000000010000000-0x000000001002B000-memory.dmp upx behavioral2/memory/4288-10-0x0000000010000000-0x000000001002B000-memory.dmp upx behavioral2/memory/3976-9-0x0000000010000000-0x000000001002B000-memory.dmp upx behavioral2/memory/2028-11-0x0000000010000000-0x000000001002B000-memory.dmp upx behavioral2/memory/2028-12-0x0000000010000000-0x000000001002B000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4288 set thread context of 2028 4288 DBS.EXE 85 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\DBS.EXE b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe File created C:\Program Files\DBS.EXE b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4604 2028 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3976 wrote to memory of 4288 3976 b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe 84 PID 3976 wrote to memory of 4288 3976 b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe 84 PID 3976 wrote to memory of 4288 3976 b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe 84 PID 4288 wrote to memory of 2028 4288 DBS.EXE 85 PID 4288 wrote to memory of 2028 4288 DBS.EXE 85 PID 4288 wrote to memory of 2028 4288 DBS.EXE 85 PID 4288 wrote to memory of 2028 4288 DBS.EXE 85 PID 4288 wrote to memory of 2028 4288 DBS.EXE 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9dbb1993e6cf4e394f0c4d2fb632106_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Program Files\DBS.EXE"C:\Program Files\DBS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\userinit.exeC:\Windows\SYSTEM32\userinit.exe3⤵
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 5324⤵
- Program crash
PID:4604
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2028 -ip 20281⤵PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5b9dbb1993e6cf4e394f0c4d2fb632106
SHA146a9e966b2e342c89bc989db1a3bf9b450900ffa
SHA2561f3a784fe2e6a93ff2cfd0a9755743149e943025b9d2b78721a0c6b4d3149a3d
SHA512ed5c446047c0a82e97ac53e2862092e1536ed9060d2ea3e5ea5c32af90493d537570ecfe890d2ce107a5181e7435bccace0f676f2b5432e940863c51da094d37