Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe
-
Size
46KB
-
MD5
bb48ecef31f79f2762b6b9ff79c5fe53
-
SHA1
b5be2e11b0a61c81b0e23baaf0b7465762550b6f
-
SHA256
72be8645c12cff0c6f00e3772194ae4d920a65ef5f1a3036b700c59301c9f7d3
-
SHA512
daf291cbd82fa8e5c3e8c0d99c3baa1647ee0c613b798f72cef78e88ee7a423ae1954a232fb3f690c0ac2aae7bf2a27d6930afc3a05a4a8e4715702face68acf
-
SSDEEP
768:750cdyWxE05BeZmblz7Ngi9CioEgjYGtYBVZXcVymYaNdcpsWXV:FCWxvfKO7iQCqGqBVZXc1VNOvV
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\D4495A5B\ImagePath = "C:\\Windows\\system32\\D4495A5B.EXE -D4495A5B" bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3856 D4495A5B.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\D4495A5B.EXE bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\D4495A5B.EXE bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe File created C:\Windows\SysWOW64\D4495A5B.EXE D4495A5B.EXE File created C:\Windows\SysWOW64\D4495A5B.DLL D4495A5B.EXE File created C:\Windows\SysWOW64\delme.bat bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D4495A5B.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3828 bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe 3828 bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe 3856 D4495A5B.EXE 3856 D4495A5B.EXE 3856 D4495A5B.EXE 3856 D4495A5B.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3828 wrote to memory of 2832 3828 bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe 85 PID 3828 wrote to memory of 2832 3828 bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe 85 PID 3828 wrote to memory of 2832 3828 bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb48ecef31f79f2762b6b9ff79c5fe53_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\delme.bat2⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\D4495A5B.EXEC:\Windows\SysWOW64\D4495A5B.EXE -D4495A5B1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5bb48ecef31f79f2762b6b9ff79c5fe53
SHA1b5be2e11b0a61c81b0e23baaf0b7465762550b6f
SHA25672be8645c12cff0c6f00e3772194ae4d920a65ef5f1a3036b700c59301c9f7d3
SHA512daf291cbd82fa8e5c3e8c0d99c3baa1647ee0c613b798f72cef78e88ee7a423ae1954a232fb3f690c0ac2aae7bf2a27d6930afc3a05a4a8e4715702face68acf
-
Filesize
239B
MD5c18d7ff37c26e660b31018ea81cbf724
SHA13dbdfe1217423bccb350842cf5ce6c7e3edba9bc
SHA25629663e5da6caead9edc541b21a4d63456bf43e33b32bb18709fddfa1d4d325c2
SHA512454e25aeb892e6f425a3b201b4d0238edacd709375e1095b485dd220810c26ef05df806841d0c43fbfc57a174fa823da133834cd54dc6d7ab3f033ce2b1707f1