Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
c0075917689273894c19c475b866208a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0075917689273894c19c475b866208a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0075917689273894c19c475b866208a_JaffaCakes118.exe
-
Size
68KB
-
MD5
c0075917689273894c19c475b866208a
-
SHA1
25241f3a5821caeeb988bb9215b614d925acd253
-
SHA256
d50368df7a738abbaa9238dd33cc54ffafcd9b30c00d6fa4c22abd87d0fe44fa
-
SHA512
0181e8fd03ae9b4f08cc27b602a44499a73dbbd5436a12f6601471b06b99cda125e62aa59fbc527f0d7133cb6fa8e2573c5771a59dbdc4d0918b469ccc85bf86
-
SSDEEP
1536:r1BvK2hM46fGBCzSfNNI6yx8Hoh3eypmrYbwWou:r1BvK7pmCzSlNILr7mrlu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2712 BCSSync.exe 2116 BCSSync.exe -
Loads dropped DLL 3 IoCs
pid Process 2740 c0075917689273894c19c475b866208a_JaffaCakes118.exe 2740 c0075917689273894c19c475b866208a_JaffaCakes118.exe 2712 BCSSync.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1072 set thread context of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 2712 set thread context of 2116 2712 BCSSync.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe c0075917689273894c19c475b866208a_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe c0075917689273894c19c475b866208a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0075917689273894c19c475b866208a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0075917689273894c19c475b866208a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync .exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2740 1072 c0075917689273894c19c475b866208a_JaffaCakes118.exe 30 PID 2740 wrote to memory of 2712 2740 c0075917689273894c19c475b866208a_JaffaCakes118.exe 31 PID 2740 wrote to memory of 2712 2740 c0075917689273894c19c475b866208a_JaffaCakes118.exe 31 PID 2740 wrote to memory of 2712 2740 c0075917689273894c19c475b866208a_JaffaCakes118.exe 31 PID 2740 wrote to memory of 2712 2740 c0075917689273894c19c475b866208a_JaffaCakes118.exe 31 PID 2712 wrote to memory of 2116 2712 BCSSync.exe 32 PID 2712 wrote to memory of 2116 2712 BCSSync.exe 32 PID 2712 wrote to memory of 2116 2712 BCSSync.exe 32 PID 2712 wrote to memory of 2116 2712 BCSSync.exe 32 PID 2712 wrote to memory of 2116 2712 BCSSync.exe 32 PID 2712 wrote to memory of 2116 2712 BCSSync.exe 32 PID 2712 wrote to memory of 2116 2712 BCSSync.exe 32 PID 2712 wrote to memory of 2116 2712 BCSSync.exe 32 PID 2712 wrote to memory of 2116 2712 BCSSync.exe 32 PID 2712 wrote to memory of 2116 2712 BCSSync.exe 32 PID 2116 wrote to memory of 1128 2116 BCSSync.exe 33 PID 2116 wrote to memory of 1128 2116 BCSSync.exe 33 PID 2116 wrote to memory of 1128 2116 BCSSync.exe 33 PID 2116 wrote to memory of 1128 2116 BCSSync.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0075917689273894c19c475b866208a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0075917689273894c19c475b866208a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\c0075917689273894c19c475b866208a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0075917689273894c19c475b866208a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\c0075917689273894c19c475b866208a_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\c0075917689273894c19c475b866208a_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\c0075917689273894c19c475b866208a_JaffaCakes118.exe5⤵
- System Location Discovery: System Language Discovery
PID:1128
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5a5278c26cb6be6c1d5dd3a17a03f0876
SHA1b1ece38b58f0cf5acc0935f1a71b5e511dff4138
SHA256ed89f5e9f2972c59583dca3d807474687acfcd018af02fffc0df4413fbb081ba
SHA5121785575e5be7908ae79fadf52f891eb9b2971e61ab96f74b5fe5c3d3af0757360ce616a2d1c9c82d5e8e51e59de7aabfa25e79a810921a4fd5403be3067a9960