Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 15:05
Static task
static1
Behavioral task
behavioral1
Sample
bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe
-
Size
166KB
-
MD5
bc3b65bef50d18acdab75426e0656db3
-
SHA1
6fca8ec1403555ed5045ac0f0564663cbc4a6df0
-
SHA256
98a725eba454c0f33a96ccf58cad810f3265c9d6ad5d1f5030e321ac02290825
-
SHA512
3a939ff8517fc64012660a0d37d75e6ba02c23d53431e7e3cc4ba0fac676b916c8664cb2f15be20fff8123c4a30535fea6704c64b4c9400572c54a0ec5f2f537
-
SSDEEP
3072:Asdam22aM+rzW+sVhKBq1mckVTwk1UFlc/Mu+AyUXP/ArLzt:AstmkhKQ1jELWlcuAyUX3czt
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\E53B0\\F88D4.exe" bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4828-3-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/212-19-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/212-20-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4828-21-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4828-22-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2296-132-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4828-133-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4828-303-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4828 wrote to memory of 212 4828 bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe 92 PID 4828 wrote to memory of 212 4828 bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe 92 PID 4828 wrote to memory of 212 4828 bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe 92 PID 4828 wrote to memory of 2296 4828 bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe 96 PID 4828 wrote to memory of 2296 4828 bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe 96 PID 4828 wrote to memory of 2296 4828 bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe startC:\Program Files (x86)\LP\D4AE\9CB.exe%C:\Program Files (x86)\LP\D4AE2⤵PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bc3b65bef50d18acdab75426e0656db3_JaffaCakes118.exe startC:\Program Files (x86)\B0089\lvvm.exe%C:\Program Files (x86)\B00892⤵PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD50f26bc4e7df2b67c5f6092cfe7e5bda6
SHA1d9821bf8dfd0b874a272f3d3e05659aac59167f7
SHA2567c4df6324b1d46b2bc351cda892bd989b6b1ca926d10b9c24cc8f8dadf52ebe5
SHA512b5a8ddc45648e500d95a0099b6e65746d9fe07897e732aedb632fc1c8d57646fd15598508cde90dd9d28838ff4e6e16cb516ed2152f6015af92bef3f6eb04a12
-
Filesize
1KB
MD5759b7797cb59a49e4f71b9e246d50dc1
SHA184497455c1b4738c382fc553c7a4f3d6d84ecd5e
SHA256729ba20ed01eec52c424568b865f868602b2a9164b9b1ee7232ecb2da76bcad8
SHA5124707fff306d68acb6328f1aef2dda81874ac2239cf3278587e15c11229a5663f0e33fc339ce6f136672fc0be4026bd5fe10a58e066aff89a1ffd616c1678ab2e
-
Filesize
1KB
MD5d153f21d90e946d60145faa01d45e209
SHA1f942c162378a3a56314962b22b1a4c7ac88e2daa
SHA2564af9546468ff30d9e4ce2b5031ba3646776559424a4970bd069f2f1f0e83582b
SHA5125a524534599f3d7173de354f24c1bf3f49746343e55b00becd08c5dbcdddc4c1b896dcf087666ea966993669c8c1b99ace38863dd4a646671c74b605121e93ac
-
Filesize
897B
MD557d302b1807cb388ac908460bbab7606
SHA1982f48053a2f616cc1a30e955ff01d27e3216b64
SHA25603f2b49eaf2064363720a4d826c15fe9ee7a5dc41ec86a3d2ad5e0bb19fa224c
SHA5122c241338500219310518a9b9d99848dc4f0ad4f59583532b1092920367a5bdcfa2a748eeb587310d9e9bda01521d396b7a2343cee9e933ad76fa67898a114937