Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe
-
Size
305KB
-
MD5
c26c87313b0bb709855ee1f541ec865c
-
SHA1
eff3ed9070087cc7fe02ad4302b1801070f33092
-
SHA256
90826e4017db7e4365dc50153f3187638dc14a112e00722fd13f4ff84bd40ccd
-
SHA512
170f9bfd2c42b5acd81bc5e105d744840db86a9fbf33e39f191b429bd67c3b8275c00e4deeae46fa331f7bdf09f5b6a22c9a074726a0d5a9a616d45b3e7bfaf1
-
SSDEEP
6144:a4V7nL2adqmpbSwQYpdE9nOYrGFigq9EbAVpRXFV:a4V7nL2a9pR109n7rOilE8LRVV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2584 svchost.exe 2556 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 2700 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 2700 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 2584 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\X: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2240 set thread context of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2584 set thread context of 2556 2584 svchost.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 2584 svchost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2700 2240 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2584 2700 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 31 PID 2700 wrote to memory of 2584 2700 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 31 PID 2700 wrote to memory of 2584 2700 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 31 PID 2700 wrote to memory of 2584 2700 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 31 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32 PID 2584 wrote to memory of 2556 2584 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
PID:2556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD5c26c87313b0bb709855ee1f541ec865c
SHA1eff3ed9070087cc7fe02ad4302b1801070f33092
SHA25690826e4017db7e4365dc50153f3187638dc14a112e00722fd13f4ff84bd40ccd
SHA512170f9bfd2c42b5acd81bc5e105d744840db86a9fbf33e39f191b429bd67c3b8275c00e4deeae46fa331f7bdf09f5b6a22c9a074726a0d5a9a616d45b3e7bfaf1