Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe
-
Size
128KB
-
MD5
bef8b24a626d99a3d41257061679339e
-
SHA1
e7eb63483cf9161860ec4800db41280644485e8f
-
SHA256
f0934dce9880901a78ecee869dc30e73e7590139d61dac76253d1fc2aa40dfdf
-
SHA512
8ad92946f15c078c4eccb2cccf0a429b540aee68d454e8b01e825ec3f083ac960d1d785daac73e6bf32f6ea4b73298a4f4413627c1cec8751a54c135344fa524
-
SSDEEP
3072:Hk5befKvym0qeWLnsi5VildHCzU4tf0dj0Sq9Fv8S4LBtlu2h8Zshri:Hkptym7Lsi5VgBCDGjqFv8Ff0cr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1792 ~tmp00156.exe 2768 ~tmp00157.exe -
Loads dropped DLL 11 IoCs
pid Process 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 2060 WerFault.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\reset5c.dll ~tmp00157.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2768 set thread context of 2404 2768 ~tmp00157.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2060 1792 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~tmp00156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~tmp00157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2768 ~tmp00157.exe 2768 ~tmp00157.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2768 ~tmp00157.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2768 ~tmp00157.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1792 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 30 PID 2444 wrote to memory of 1792 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 30 PID 2444 wrote to memory of 1792 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 30 PID 2444 wrote to memory of 1792 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 30 PID 1792 wrote to memory of 2060 1792 ~tmp00156.exe 31 PID 1792 wrote to memory of 2060 1792 ~tmp00156.exe 31 PID 1792 wrote to memory of 2060 1792 ~tmp00156.exe 31 PID 1792 wrote to memory of 2060 1792 ~tmp00156.exe 31 PID 2444 wrote to memory of 2768 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 32 PID 2444 wrote to memory of 2768 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 32 PID 2444 wrote to memory of 2768 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 32 PID 2444 wrote to memory of 2768 2444 bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe 32 PID 2768 wrote to memory of 492 2768 ~tmp00157.exe 7 PID 2768 wrote to memory of 2404 2768 ~tmp00157.exe 33 PID 2768 wrote to memory of 2404 2768 ~tmp00157.exe 33 PID 2768 wrote to memory of 2404 2768 ~tmp00157.exe 33 PID 2768 wrote to memory of 2404 2768 ~tmp00157.exe 33 PID 2768 wrote to memory of 2404 2768 ~tmp00157.exe 33 PID 2768 wrote to memory of 2132 2768 ~tmp00157.exe 34 PID 2768 wrote to memory of 2132 2768 ~tmp00157.exe 34 PID 2768 wrote to memory of 2132 2768 ~tmp00157.exe 34 PID 2768 wrote to memory of 2132 2768 ~tmp00157.exe 34
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bef8b24a626d99a3d41257061679339e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\Documents\~tmp00156.exeC:\Users\Admin\Documents\~tmp00156.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 923⤵
- Loads dropped DLL
- Program crash
PID:2060
-
-
-
C:\Users\Admin\Documents\~tmp00157.exeC:\Users\Admin\Documents\~tmp00157.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\DOCUME~1\~TMP00~2.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD569cef5c918cb4812d31cd400986e3948
SHA1ee8a10e13a9f23ae79e44ebe74a6804aa32a651f
SHA25691eb03d1d0b11b4d5a5b458b9bd2e01d5783c9cf21fa4bce2f0b49f27cb43535
SHA5122ed02bd5e0d1012faf9ee7239060a82c7f6c315178fecdd729b8472763d71cab8133d622fe0a3f3c79375f346a156bbb6342151800ab8aa01eafb252bc7e6f49
-
Filesize
51KB
MD541530477eeed6290291232f894032330
SHA1f1dc8c8afab51e6836157d21731ddb51b9534090
SHA256f1faf01bd350aa0038202b416f0b06c0e0fc5bfae30ddf07b3d63c6aed4e5ea9
SHA5126ef9513653da16e91661f4cbd10ceb8809bbf841e070b9a4b72acee15df64cf394088e66bd4ce16bd96544b8788a07c31a6f5c06435f9694aa4939e78a410f57