Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 16:31
Static task
static1
Behavioral task
behavioral1
Sample
bc7c353e354e765218b474296add06d8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc7c353e354e765218b474296add06d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc7c353e354e765218b474296add06d8_JaffaCakes118.exe
-
Size
125KB
-
MD5
bc7c353e354e765218b474296add06d8
-
SHA1
a9a89d9a4a5ad86f555481dd85c9cb8d566c57e8
-
SHA256
41057df26c2ea138e06245a6cffa25b53c4c57db5c86ca683bb7bebe8454ac87
-
SHA512
874f1b4d7759ae4a715f475dc4c9b0807ba61bac8b4e08ea0fb61a019cb4f5f7d8ac0a20ba5402eb7e25dbc0f51e386230502e3b5e08ad18dd61ae55608f026b
-
SSDEEP
3072:EJgwBIxhn+dz7diTqkGqcZBUPs7dHNnu3lAzyDJkluJfBd8x:EuwWx8fScnUPey1BtB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2800 Tcewaa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\18RH6WMFH2 = "C:\\Windows\\Tcewaa.exe" Tcewaa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Tcewaa.exe bc7c353e354e765218b474296add06d8_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job bc7c353e354e765218b474296add06d8_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job bc7c353e354e765218b474296add06d8_JaffaCakes118.exe File created C:\Windows\Tcewaa.exe bc7c353e354e765218b474296add06d8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc7c353e354e765218b474296add06d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tcewaa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main Tcewaa.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International Tcewaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe 2800 Tcewaa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2800 Tcewaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2800 2672 bc7c353e354e765218b474296add06d8_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2800 2672 bc7c353e354e765218b474296add06d8_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2800 2672 bc7c353e354e765218b474296add06d8_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2800 2672 bc7c353e354e765218b474296add06d8_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc7c353e354e765218b474296add06d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc7c353e354e765218b474296add06d8_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\Tcewaa.exeC:\Windows\Tcewaa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD5d37bbfd2e7a2482f8fc87638c60dfc12
SHA113f848165f1afbb50ad3d4e8ac30a881e553334e
SHA2561fb43c74325227efee98cb2376a3999b2e56db893cfca3465b42147386813f17
SHA5124ba0848359eb1f7e0b8137788b885ea34e595cc6739771c63b515ac030ef495cde51f7bc26ba2612ecbe9f45cab0d679b9eb83ab85f9a17893863522db987b32
-
Filesize
125KB
MD5bc7c353e354e765218b474296add06d8
SHA1a9a89d9a4a5ad86f555481dd85c9cb8d566c57e8
SHA25641057df26c2ea138e06245a6cffa25b53c4c57db5c86ca683bb7bebe8454ac87
SHA512874f1b4d7759ae4a715f475dc4c9b0807ba61bac8b4e08ea0fb61a019cb4f5f7d8ac0a20ba5402eb7e25dbc0f51e386230502e3b5e08ad18dd61ae55608f026b