Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe
-
Size
102KB
-
MD5
c928a5fae77038557352e5f0d26a9878
-
SHA1
635e67bdffebddca53e89e93d6c58df968af0699
-
SHA256
8f12c2d84b71cf6eb484dd1c6cc4b5b6b081267f6712c6cd78ab9d9a10681b6b
-
SHA512
e7a90a6587168e6c2b844cfde43201e7a61fcb6be71baf3def65c94722e67397ed38da96487f7cbc31a20cb25095df30d43ab7fbc530bb27facfcb09c637517a
-
SSDEEP
3072:SublXK4r9e/Cva9Yz5BSfreMTB7zDcgirM1b:ZblXK4rz6Yz5eyGkgAM1b
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3404 c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Version = "C:\\Windows\\system32\\ntservice.exe" c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Java Version = "C:\\Windows\\system32\\keeper.exe" c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\keeper.exe c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\keeper.exe c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe File created C:\Windows\SysWOW64\ntservice.exe c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe File created C:\Windows\SysWOW64\mynotepad.exe c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ntservice.exe c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c928a5fae77038557352e5f0d26a9878_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD55737cadea39cee4ba911b356be291f71
SHA14cd938797dc004a6c64c5032fb5d15ab28cc03ee
SHA2567f049e65c68818689ae67b610e7965e43470d64e36e85b3ef6d4965f589ae4c0
SHA5126c3b267e6680160de90b3b057ae25f8e8461b829f1beab5ec5829850fc4a10e048d503c2ed9345f4419e5c837ae45768bf3c5c0bbcda8ca8218f18fd47d2cca5
-
Filesize
102KB
MD5c928a5fae77038557352e5f0d26a9878
SHA1635e67bdffebddca53e89e93d6c58df968af0699
SHA2568f12c2d84b71cf6eb484dd1c6cc4b5b6b081267f6712c6cd78ab9d9a10681b6b
SHA512e7a90a6587168e6c2b844cfde43201e7a61fcb6be71baf3def65c94722e67397ed38da96487f7cbc31a20cb25095df30d43ab7fbc530bb27facfcb09c637517a