Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
ba732afff71bad25f846de4761808b22_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba732afff71bad25f846de4761808b22_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba732afff71bad25f846de4761808b22_JaffaCakes118.exe
-
Size
347KB
-
MD5
ba732afff71bad25f846de4761808b22
-
SHA1
cf2994708d441962a5c9b81cbaf3a13e272a5f4d
-
SHA256
af0218c7d1718535bab851eb1863b029ae3b8883f5fcb4db4f72fa743e4a8153
-
SHA512
31b7a71123090ceb20d5fdf2ced8e673c0ed0e9aaa8381a597a2c6429133ffeddfc9736999da4de8d35460c91cf77f278cf32e4d49205e21ab60c0c423eea035
-
SSDEEP
6144:bYewkrvWHrO4HFhWarNiMZph0CzhVJwYiYMhZbqhp2XfhcP+Rr7hnDfGyuXy2:bZwkjkO4lZiMZphrEvh+p2X5cP+RPoyQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1856 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2632 360tray.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\360tray.exe ba732afff71bad25f846de4761808b22_JaffaCakes118.exe File opened for modification C:\Windows\360tray.exe ba732afff71bad25f846de4761808b22_JaffaCakes118.exe File created C:\Windows\uninstal.bat ba732afff71bad25f846de4761808b22_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba732afff71bad25f846de4761808b22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 360tray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2984 ba732afff71bad25f846de4761808b22_JaffaCakes118.exe Token: SeDebugPrivilege 2632 360tray.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 360tray.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2984 wrote to memory of 1856 2984 ba732afff71bad25f846de4761808b22_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1856 2984 ba732afff71bad25f846de4761808b22_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1856 2984 ba732afff71bad25f846de4761808b22_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1856 2984 ba732afff71bad25f846de4761808b22_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1856 2984 ba732afff71bad25f846de4761808b22_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1856 2984 ba732afff71bad25f846de4761808b22_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1856 2984 ba732afff71bad25f846de4761808b22_JaffaCakes118.exe 32 PID 2632 wrote to memory of 1976 2632 360tray.exe 31 PID 2632 wrote to memory of 1976 2632 360tray.exe 31 PID 2632 wrote to memory of 1976 2632 360tray.exe 31 PID 2632 wrote to memory of 1976 2632 360tray.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba732afff71bad25f846de4761808b22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba732afff71bad25f846de4761808b22_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1856
-
-
C:\Windows\360tray.exeC:\Windows\360tray.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5ba732afff71bad25f846de4761808b22
SHA1cf2994708d441962a5c9b81cbaf3a13e272a5f4d
SHA256af0218c7d1718535bab851eb1863b029ae3b8883f5fcb4db4f72fa743e4a8153
SHA51231b7a71123090ceb20d5fdf2ced8e673c0ed0e9aaa8381a597a2c6429133ffeddfc9736999da4de8d35460c91cf77f278cf32e4d49205e21ab60c0c423eea035
-
Filesize
218B
MD5fba2e220e74e5ce8c68a66ff1443f84b
SHA1865c26bee1e1c716c9bd5b7d6f651df43b7a309a
SHA2561b10ecdcd65cca23d619ac2da600cf19792588cfef8fb09715e570e7a7511b20
SHA5126c6855a179b336dbb4a373aad8da88c6eff06cbbe6f6d72740d9a905d77d5479b336c706387a038de630a9998c8c7b892e3cd29894f601e80549c37e9889d3df