Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
c78d5ac4163c30d90436e363f50fc961
-
SHA1
a66874ffd2027a6a7d3a4ffcc9df47b993079503
-
SHA256
4e6fd5490b4d36cfa6b638245eb6b58cba16ea44c421eb64992b4951e73c7d85
-
SHA512
b279572060d4a7d64d83ea286785db750d9c16e24cebeb429fb1d1340fcbe28d3f8ab4e03631dd7b00b6bc8d91673aaa69b9aa003ce15f96d80e53db95ed15fb
-
SSDEEP
24576:elWQDPB57KeMre0WuFY9uCOuLIZsveK1jQCg1hbJGisdUCWd+/n875qVBSn8CaYp:LQDPj7dMrVvMuNucZS1QCaOFU75YS/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2952 note.exe -
Loads dropped DLL 2 IoCs
pid Process 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\note.exe = "C:\\Windows\\SysWOW64\\note.exe" note.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\note.exe c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe File created C:\Windows\SysWOW64\note.exe note.exe File created C:\Windows\SysWOW64\note.exe c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe 2952 note.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2952 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2952 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2952 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2952 2552 c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c78d5ac4163c30d90436e363f50fc961_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\note.exe"C:\Windows\system32\note.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5c78d5ac4163c30d90436e363f50fc961
SHA1a66874ffd2027a6a7d3a4ffcc9df47b993079503
SHA2564e6fd5490b4d36cfa6b638245eb6b58cba16ea44c421eb64992b4951e73c7d85
SHA512b279572060d4a7d64d83ea286785db750d9c16e24cebeb429fb1d1340fcbe28d3f8ab4e03631dd7b00b6bc8d91673aaa69b9aa003ce15f96d80e53db95ed15fb