Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe
-
Size
28KB
-
MD5
bd26a131b8c2ccb82bfe7e8279069e7d
-
SHA1
c64750a53c71929d786a0e46828fd2de5e8337df
-
SHA256
4a7e9a71df13d00579dda1ce2653229f629caf282d284f5fef7602191e32a5d3
-
SHA512
395e884db9a32cadd7df8517858da923dcd057d58a8f13130f64e1ae545ad7c377c40a6914d6c28a955cc4dfddc350d972bb34d7246171c316236db21fe7b29d
-
SSDEEP
768:yh/rqwViUTg5J1sMpidL02iuPyExtaprcJI3o9NbdAohD4uS9e:S/WwVv8sd9PyC8prGIiIohcZ9e
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\38A5CC4C\ImagePath = "C:\\Windows\\system32\\38A5CC4C.EXE -a" bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2272 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2868 38A5CC4C.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\38A5CC4C.DLL 38A5CC4C.EXE File created C:\Windows\SysWOW64\delme.bat bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe File created C:\Windows\SysWOW64\38A5CC4C.EXE bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\38A5CC4C.EXE bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe File created C:\Windows\SysWOW64\38A5CC4C.EXE 38A5CC4C.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38A5CC4C.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2716 bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe 2868 38A5CC4C.EXE 2868 38A5CC4C.EXE 2868 38A5CC4C.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2272 2716 bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2272 2716 bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2272 2716 bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2272 2716 bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\delme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Windows\SysWOW64\38A5CC4C.EXEC:\Windows\SysWOW64\38A5CC4C.EXE -a1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5bd26a131b8c2ccb82bfe7e8279069e7d
SHA1c64750a53c71929d786a0e46828fd2de5e8337df
SHA2564a7e9a71df13d00579dda1ce2653229f629caf282d284f5fef7602191e32a5d3
SHA512395e884db9a32cadd7df8517858da923dcd057d58a8f13130f64e1ae545ad7c377c40a6914d6c28a955cc4dfddc350d972bb34d7246171c316236db21fe7b29d
-
Filesize
233B
MD58549a13d93040971db138ae501a35e63
SHA1ed7693f1066e10bb156f4a7b7520c3923485dac1
SHA256e20d56953ed59981cbcf5215f702e0fab4be5a08fe7d73c7e250bf16c6eba674
SHA512d4d0a03fb0e449ee2e8e6547a4a94b1f81cb6322518914afd063d14d3a2133867c42c100d6f20ff83e7f5a7bdfba5a9b5bbad37fc9477baa9a8ba3d66f113315