Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe
-
Size
47KB
-
MD5
c11abcee7749e031bebe82299be3dd4c
-
SHA1
ad6903f871601839c71405114e139419a8aaa7ce
-
SHA256
605e6a97e61c044e15d9161cfb3060a0e232297524ff15869809824633afc775
-
SHA512
4fd9cb9a65903dfaf6455fe0e1afcf8e9baaeb63e0ff5b328e5605f8eeb38484d72728e79a5293d86f58bc68981fbd26761dd16b4d4a4e782ed88b6f6af28404
-
SSDEEP
768:+dAImwRvJGu1NNcwRvzEsaROxxdxjXifQOqyEOH63EeFCCfHXoI+:wZoHwdzEsaIxrRXifQX3V3FdfHXo1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Kills process with taskkill 2 IoCs
pid Process 2772 taskkill.exe 2780 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2772 taskkill.exe Token: SeDebugPrivilege 2780 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2756 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2756 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2756 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2756 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2772 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2772 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2772 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2772 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2780 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 33 PID 2220 wrote to memory of 2780 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 33 PID 2220 wrote to memory of 2780 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 33 PID 2220 wrote to memory of 2780 2220 c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe 33 PID 2756 wrote to memory of 2356 2756 cmd.exe 36 PID 2756 wrote to memory of 2356 2756 cmd.exe 36 PID 2756 wrote to memory of 2356 2756 cmd.exe 36 PID 2756 wrote to memory of 2356 2756 cmd.exe 36 PID 2356 wrote to memory of 2880 2356 net.exe 37 PID 2356 wrote to memory of 2880 2356 net.exe 37 PID 2356 wrote to memory of 2880 2356 net.exe 37 PID 2356 wrote to memory of 2880 2356 net.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c11abcee7749e031bebe82299be3dd4c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360Safe.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2780
-