Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe
-
Size
73KB
-
MD5
c9066075af479151ff6a4b48b4a318bc
-
SHA1
cebc95bd98bf6e44af3bbfdb83e51eb3bf01b010
-
SHA256
b37f3335febc2c42bd8bdbdbf594e55b113d1b1dad510b85bf302efb747c7b4a
-
SHA512
1d3ad0489d6af406566bc7ed9130f1728c28750789ae5d2591a4cbf5517fd1658bef3116f08eda762b8992ce801b5b57f1d387a042a3deea32d1a393755bc9e6
-
SSDEEP
1536:xy0fk9SqxfnLRvovrnz2GtCswK/NO4eSRtUsLZ:PfkFtgz2GksJchSRtPd
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F8B9E5C0-4DCC-CFCF-ABA5-00401D608516} kdja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F8B9E5C0-4DCC-CFCF-ABA5-00401D608516}\StubPath = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Administrative Tools\\Recycle Bin\\kdja.exe" kdja.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Active Setup\Installed Components kdja.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F8B9E5C0-4DCC-CFCF-ABA5-00401D608516} kdja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F8B9E5C0-4DCC-CFCF-ABA5-00401D608516}\StubPath = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Administrative Tools\\Recycle Bin\\kdja.exe" kdja.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Active Setup\Installed Components kdja.exe -
Deletes itself 1 IoCs
pid Process 780 kdja.exe -
Executes dropped EXE 2 IoCs
pid Process 780 kdja.exe 228 kdja.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\Recycle Bin\Desktop.ini c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\Recycle Bin\Desktop.ini c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdja.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1116 wrote to memory of 780 1116 c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe 84 PID 1116 wrote to memory of 780 1116 c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe 84 PID 1116 wrote to memory of 780 1116 c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe 84 PID 780 wrote to memory of 228 780 kdja.exe 88 PID 780 wrote to memory of 228 780 kdja.exe 88 PID 780 wrote to memory of 228 780 kdja.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe"1⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\Recycle Bin\kdja.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\Recycle Bin\kdja.exe" C:\Users\Admin\AppData\Local\Temp\c9066075af479151ff6a4b48b4a318bc_JaffaCakes118.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\Recycle Bin\kdja.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\Recycle Bin\kdja.exe" cl3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5c9066075af479151ff6a4b48b4a318bc
SHA1cebc95bd98bf6e44af3bbfdb83e51eb3bf01b010
SHA256b37f3335febc2c42bd8bdbdbf594e55b113d1b1dad510b85bf302efb747c7b4a
SHA5121d3ad0489d6af406566bc7ed9130f1728c28750789ae5d2591a4cbf5517fd1658bef3116f08eda762b8992ce801b5b57f1d387a042a3deea32d1a393755bc9e6