Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe
-
Size
28KB
-
MD5
bd26a131b8c2ccb82bfe7e8279069e7d
-
SHA1
c64750a53c71929d786a0e46828fd2de5e8337df
-
SHA256
4a7e9a71df13d00579dda1ce2653229f629caf282d284f5fef7602191e32a5d3
-
SHA512
395e884db9a32cadd7df8517858da923dcd057d58a8f13130f64e1ae545ad7c377c40a6914d6c28a955cc4dfddc350d972bb34d7246171c316236db21fe7b29d
-
SSDEEP
768:yh/rqwViUTg5J1sMpidL02iuPyExtaprcJI3o9NbdAohD4uS9e:S/WwVv8sd9PyC8prGIiIohcZ9e
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\654E75DE\ImagePath = "C:\\Windows\\system32\\654E75DE.EXE -a" bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4444 654E75DE.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\654E75DE.DLL 654E75DE.EXE File created C:\Windows\SysWOW64\654E75DE.EXE bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\654E75DE.EXE bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe File created C:\Windows\SysWOW64\654E75DE.EXE 654E75DE.EXE File created C:\Windows\SysWOW64\delme.bat bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 654E75DE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5072 bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe 5072 bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe 4444 654E75DE.EXE 4444 654E75DE.EXE 4444 654E75DE.EXE 4444 654E75DE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2864 5072 bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe 85 PID 5072 wrote to memory of 2864 5072 bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe 85 PID 5072 wrote to memory of 2864 5072 bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd26a131b8c2ccb82bfe7e8279069e7d_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\delme.bat2⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\654E75DE.EXEC:\Windows\SysWOW64\654E75DE.EXE -a1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5bd26a131b8c2ccb82bfe7e8279069e7d
SHA1c64750a53c71929d786a0e46828fd2de5e8337df
SHA2564a7e9a71df13d00579dda1ce2653229f629caf282d284f5fef7602191e32a5d3
SHA512395e884db9a32cadd7df8517858da923dcd057d58a8f13130f64e1ae545ad7c377c40a6914d6c28a955cc4dfddc350d972bb34d7246171c316236db21fe7b29d
-
Filesize
233B
MD58549a13d93040971db138ae501a35e63
SHA1ed7693f1066e10bb156f4a7b7520c3923485dac1
SHA256e20d56953ed59981cbcf5215f702e0fab4be5a08fe7d73c7e250bf16c6eba674
SHA512d4d0a03fb0e449ee2e8e6547a4a94b1f81cb6322518914afd063d14d3a2133867c42c100d6f20ff83e7f5a7bdfba5a9b5bbad37fc9477baa9a8ba3d66f113315