Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe
-
Size
19KB
-
MD5
bf6538443c85ebf42de962c57d69f5f6
-
SHA1
cd18b800c1e455a8394e08c4d076ed844b4f8b1d
-
SHA256
ddeadd997589b2932c9e89cae8542b83b215e9682d67c0480e86ea9e78d963d8
-
SHA512
71600711de834ebba871e588335c2876d61ab07e41c3ec7826016873e0dfb7717579d0ababce6bd95dfa881d2615c2fbe601bff99de98a88736d4e44de7e3920
-
SSDEEP
384:d08hYKQhipr8bfdsYx717XWJAiQ/O0pJX/OwSblCkBQwNwW+TiKJ49oo5aHK:/hkhmUfd3/WJ5QpJ21blLBujc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3020 bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2784 3020 bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2784 3020 bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2784 3020 bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2784 3020 bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\BF6538~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exeC:\Windows\SysWOW64\bf6538443c85ebf42de962c57d69f5f6_JaffaCakes118.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5bf6538443c85ebf42de962c57d69f5f6
SHA1cd18b800c1e455a8394e08c4d076ed844b4f8b1d
SHA256ddeadd997589b2932c9e89cae8542b83b215e9682d67c0480e86ea9e78d963d8
SHA51271600711de834ebba871e588335c2876d61ab07e41c3ec7826016873e0dfb7717579d0ababce6bd95dfa881d2615c2fbe601bff99de98a88736d4e44de7e3920