Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 19:26
Behavioral task
behavioral1
Sample
c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
c3ac6788e749c433eaf7cd17b0aee92e
-
SHA1
58abb9cb9844d8248bab92901571e5069e9f655d
-
SHA256
b68e6bf4696b566055d30a0ccdf35b784b725fe3d30dfce396612fc8058aace3
-
SHA512
6e80a5d9a01dde067b5b367d7ed096b168f9f9513904dc35538767331a37c8524721c2d7958ebb33197051da747fbf65471dae34dd0e9675ae3338fd57a036b4
-
SSDEEP
24576:Ib77WAYBBAEXsG0gj26ohW8jKXe54V+N9ntS/eve+cHE/se:ICAMsG0nlh5jt9cHE/
Malware Config
Signatures
-
Detects BazaLoader malware 3 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests - JaffaCakes118.
resource yara_rule behavioral1/files/0x00070000000120fd-6.dat BazaLoader behavioral1/memory/2352-15-0x0000000000460000-0x00000000005F0000-memory.dmp BazaLoader behavioral1/memory/1996-16-0x0000000000400000-0x0000000000511000-memory.dmp BazaLoader -
Executes dropped EXE 1 IoCs
pid Process 1996 install.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created \??\c:\windows\install.exe c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe File created \??\c:\windows\ppsetis.dll c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe File created \??\c:\windows\SETUP_9X.INF install.exe File created \??\c:\windows\SETUP_NT.INF install.exe File created \??\c:\windows\TVicComm.sys install.exe File created \??\c:\windows\TVicCommSpy.ocx install.exe File created \??\c:\windows\ppsetis.ini c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe File created C:\WINDOWS\system\svchost.exe install.exe File created \??\c:\windows\TVICCOMM.VXD install.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1996 2352 c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe 30 PID 2352 wrote to memory of 1996 2352 c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe 30 PID 2352 wrote to memory of 1996 2352 c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe 30 PID 2352 wrote to memory of 1996 2352 c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe 30 PID 2352 wrote to memory of 1996 2352 c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe 30 PID 2352 wrote to memory of 1996 2352 c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe 30 PID 2352 wrote to memory of 1996 2352 c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c3ac6788e749c433eaf7cd17b0aee92e_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\windows\install.exec:\windows\install.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD54633553ac82bed9acd29429c03ff7b89
SHA137da199a8801a3eaa3fc18771a1d942f44121ca3
SHA2564cf15b8ba1dc2de2f0d3c835dc5a98ab406ad2bf4b62db8962bd72c627f5d2d7
SHA512712d07417e27c7545209dd0edb26435d1efc4e079bb15229719215752cfdb4c533532284c3225fdea1d7a1ca18824e3a84a0572375ab06381ff7cec0e1876259
-
Filesize
112KB
MD574e1f47727ad9c4553858e34dce94aa5
SHA11f1a93f1be04364b065fafe90667f80cb4ffb201
SHA2565b61bc55bb243a8192f5bf7a589a53c1e6e5fd251c4c31878bf7ae45070a8e92
SHA5125425976071f9885c47a15f26820d57512364ca579be26bcaebcdbb2cfe690a77ba89b485cddfd8af1d48dcb0218260630d5bd71b44273636d3ae757961af76d4