Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 10:40
Static task
static1
Behavioral task
behavioral1
Sample
bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe
-
Size
748KB
-
MD5
bb6482f11d75abb8343c222e373b0d13
-
SHA1
a9876def2439cd305157c6d49b3fcb328431c50c
-
SHA256
582abcf53bf8ada15e9af4c0c7bc0680e5d15241f2556d31b5b339ac0d962830
-
SHA512
37de0adc42f08a09ed04525e7edbb225df14fe5c174adf6b3e0130107956d053cf7eced3fd34fb91cf6b1da2e811735cc35d82b1db5e0c58db892e6c72b51af4
-
SSDEEP
12288:FXS0kMwFkLJw3xdLYGEq+Zw91+iNnyP0MCjY76aEglF1twuu:4nM1LO/LYPxQn9nY6w/w7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4840 mysqld.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Diagnostic = "C:\\mysql\\mysqld.exe" bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mysqld.exe -
Modifies Control Panel 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\AutoEndTasks = "1" bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4840 3228 bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe 92 PID 3228 wrote to memory of 4840 3228 bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe 92 PID 3228 wrote to memory of 4840 3228 bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb6482f11d75abb8343c222e373b0d13_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\mysql\mysqld.exeC:\mysql\mysqld.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD58b3537dc12ceee2a87d6c7584f7d655f
SHA1740ca3a4b12dec0f5d05bf7b3157df663c4d150e
SHA256b9c68958a1475703c31a7e61ec888a87c1839640eaf775367bc66be4fb19f99e
SHA512ed351121dd2e9e0684206d4d6ab37b188828a4b740382066350e092ca76312d7681f4747ae6a1dff17214f3381eb17ac00cfac374daa43d77c9504f514eaf2d8