Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe
-
Size
658KB
-
MD5
c0bfd5815314d93f01b02766f3aa6e78
-
SHA1
22eb36e422de7d29ca7e573400216395f5a17c5b
-
SHA256
7e92f6b7fc73b2cae02badc9be25643d0e4f2b1599d9b27d6af3cbabdfa70beb
-
SHA512
bd93548be44d75ee1ae5391d94619a7051ddcf17e00ccd96b72c5ca88e5988321f96320ad48b8d32bcd1718c140ce24e3854c673258c6a30b55ac21129b9b943
-
SSDEEP
12288:aalFG/FRwYkK19iOCr+TMoO30mYn0YaAsGpQ33M5DKTrH5fzQ2O:VFGQK19iOCr+TMoO30mYn0YaAsl33M5J
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\.Net CLR\Parameters\ServiceDll = "C:\\Windows\\system32\\f77dd45.dll" c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2212 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2276 c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe 2568 svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\f77dd45.dll c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2276 c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2212 2276 c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe 31 PID 2276 wrote to memory of 2212 2276 c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe 31 PID 2276 wrote to memory of 2212 2276 c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe 31 PID 2276 wrote to memory of 2212 2276 c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0bfd5815314d93f01b02766f3aa6e78_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\C0BFD5~1.EXE" > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k ".Net CLR"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610KB
MD50c7cfa4e36282038dda77ebe9271dd2a
SHA18f8b0b30c8e74bd2f3e9d1c557af71fb5d270ae6
SHA256a76d80d2f85f17ad9549f6a403a267f0d7f57682a13188b8ee3bc40d5b405540
SHA512bc9d49bebb17d9778c9cc507666d1dccc6c10ad8cafbfb88ce3ce32c689717d16d3cab5c115d8f46133869c7e4d6870274fbfcd385bad93f2884ca6b8ed834c9