Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 01:37
Behavioral task
behavioral1
Sample
c2069227bb786467370b839e82a610e0_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c2069227bb786467370b839e82a610e0_JaffaCakes118.exe
-
Size
208KB
-
MD5
c2069227bb786467370b839e82a610e0
-
SHA1
f1682e4c2a4f292d5c9b30f6d5aac02858952d56
-
SHA256
7cb373530e572eb9473e71bb73fe182e90b84d7a9fe032172b1e3977f20b9983
-
SHA512
f4edc139f68ceeaaed4d71dab8d3b85519ff98ec0c8cc9ab8b98c4ff563fd6c88ab7b431ada0da8ff8b8ae17f494b7dec2c2bbfca5e4d6153169c1c96635a243
-
SSDEEP
6144:2Li4p1MDzGuEiHHqGOhSkbe1Snqzs7voS:2Li01MOyKGYSkbe1KVoS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2212 k05zzzv3.exe -
Loads dropped DLL 1 IoCs
pid Process 2452 c2069227bb786467370b839e82a610e0_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2452-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/files/0x0008000000018f6e-5.dat upx behavioral1/memory/2212-11-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\k05zzzv3.exe = "C:\\Users\\Admin\\AppData\\Roaming\\k05zzzv3.exe" c2069227bb786467370b839e82a610e0_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2069227bb786467370b839e82a610e0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k05zzzv3.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main k05zzzv3.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch k05zzzv3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" k05zzzv3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe 2212 k05zzzv3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2212 k05zzzv3.exe 2212 k05zzzv3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2212 2452 c2069227bb786467370b839e82a610e0_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2212 2452 c2069227bb786467370b839e82a610e0_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2212 2452 c2069227bb786467370b839e82a610e0_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2212 2452 c2069227bb786467370b839e82a610e0_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2069227bb786467370b839e82a610e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c2069227bb786467370b839e82a610e0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Roaming\k05zzzv3.exe"C:\Users\Admin\AppData\Roaming\k05zzzv3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\ib2[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
208KB
MD5c2069227bb786467370b839e82a610e0
SHA1f1682e4c2a4f292d5c9b30f6d5aac02858952d56
SHA2567cb373530e572eb9473e71bb73fe182e90b84d7a9fe032172b1e3977f20b9983
SHA512f4edc139f68ceeaaed4d71dab8d3b85519ff98ec0c8cc9ab8b98c4ff563fd6c88ab7b431ada0da8ff8b8ae17f494b7dec2c2bbfca5e4d6153169c1c96635a243