Analysis
-
max time kernel
130s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe
-
Size
174KB
-
MD5
bd078f6d02f16420c0b8c5f70717bda2
-
SHA1
975240da1ba83fb4717cfbe70f3c36202fa6a666
-
SHA256
9b4ff1a8819d1b5a3d98e33c5f603f595ba1f42c03c0062493617eef45e4d02a
-
SHA512
f909689aa3c667b821870e2734e83e9e6dbda43f9354df218714490ed7d0aa6040c32a0e519638989b8f5393b70dbd7b76f165f8dcaaeef217a60a2fffc12fd6
-
SSDEEP
3072:tfZ7UnZ6tYPklZ0T80z7ijw0r2StHpu+Bbvf6uZmXQIGvp2LTQTw7eicmwuxhz:tf2Z6t2kafik0rZpu+NHnmAjvp2Xiw7p
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{aafbbc75-00ce-8d84-b6be-03e3e0185f9b}\\n." bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\clsid bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1} bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe Token: SeDebugPrivilege 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe Token: SeDebugPrivilege 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3532 Explorer.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4744 wrote to memory of 3532 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe 56 PID 4744 wrote to memory of 3532 4744 bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd078f6d02f16420c0b8c5f70717bda2_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744
-