Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe
-
Size
321KB
-
MD5
bc046a4234955bc74f1cdb12ab1aa79a
-
SHA1
4ff51fe7db3c1990a11179df21962a03ac8ed646
-
SHA256
78ae59a2ba226787ff7e8fc0bfc959352c4359de65119f6878f6499e30f6ff9f
-
SHA512
aab38719c13f1db687f6b40c059bb878d4ddc05c4df6b85f7a0cdfb510c6b991bbdaa3297bfc1dd430e2219d397c9a7ca8ad4f28b3c93c0401c69921d9194127
-
SSDEEP
6144:AzCpRwZ6WAwEGF7ShI966AGkAjOpoaY7zPYe4VMFxCVFkZv7uyX2kdecIN+/:A+pRwd4GFiq6xGJOpqPP6kYVF+uidetS
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys 360tay.exe File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2640 360tay.exe 3008 360tay.exe -
Loads dropped DLL 1 IoCs
pid Process 2640 360tay.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\360tay.exe bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\360tay.exe bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2800 set thread context of 3028 2800 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 31 PID 2640 set thread context of 3008 2640 360tay.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 360tay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3028 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 3028 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 3008 360tay.exe -
Suspicious behavior: LoadsDriver 20 IoCs
pid Process 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3028 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3028 2800 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 31 PID 2800 wrote to memory of 3028 2800 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 31 PID 2800 wrote to memory of 3028 2800 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 31 PID 2800 wrote to memory of 3028 2800 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 31 PID 2800 wrote to memory of 3028 2800 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 31 PID 2800 wrote to memory of 3028 2800 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 31 PID 2800 wrote to memory of 3028 2800 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 31 PID 2800 wrote to memory of 3028 2800 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 31 PID 2640 wrote to memory of 3008 2640 360tay.exe 33 PID 2640 wrote to memory of 3008 2640 360tay.exe 33 PID 2640 wrote to memory of 3008 2640 360tay.exe 33 PID 2640 wrote to memory of 3008 2640 360tay.exe 33 PID 2640 wrote to memory of 3008 2640 360tay.exe 33 PID 2640 wrote to memory of 3008 2640 360tay.exe 33 PID 2640 wrote to memory of 3008 2640 360tay.exe 33 PID 2640 wrote to memory of 3008 2640 360tay.exe 33 PID 3028 wrote to memory of 348 3028 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 34 PID 3028 wrote to memory of 348 3028 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 34 PID 3028 wrote to memory of 348 3028 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 34 PID 3028 wrote to memory of 348 3028 bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc046a4234955bc74f1cdb12ab1aa79a_JaffaCakes118.exe"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\BC046A~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:348
-
-
-
C:\Windows\SysWOW64\360tay.exeC:\Windows\SysWOW64\360tay.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\360tay.exe"C:\Windows\SysWOW64\360tay.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD5bc046a4234955bc74f1cdb12ab1aa79a
SHA14ff51fe7db3c1990a11179df21962a03ac8ed646
SHA25678ae59a2ba226787ff7e8fc0bfc959352c4359de65119f6878f6499e30f6ff9f
SHA512aab38719c13f1db687f6b40c059bb878d4ddc05c4df6b85f7a0cdfb510c6b991bbdaa3297bfc1dd430e2219d397c9a7ca8ad4f28b3c93c0401c69921d9194127