Analysis
-
max time kernel
84s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 18:36
Behavioral task
behavioral1
Sample
c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe
-
Size
105KB
-
MD5
c96432ae07371e4e4611af37db941dcd
-
SHA1
c05746baf04951491128300108e423051924f319
-
SHA256
50582c489f8c3ea28734dc26744eb6faa758e51a2c6d25d60412c20f2b040cc5
-
SHA512
7dc2c56a148fc04488909fa3d00627a494a5ead3c78c8b470b125e1904790c6c4dd4ac16f041fa0ff7f25d0d2b4b98a722f8d74e3c7d0b8473b0a8819fb96b45
-
SSDEEP
1536:fjeJLBHOnJMUQcaDHs7x0iTh9ej0pT3XG5PZX2CrcaqnV:fjS90ecabuxjTmAtYZX2CYH
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\aec.sys c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Drivers\aec.sys 22364.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 22364.exe -
Loads dropped DLL 6 IoCs
pid Process 2116 c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe 2116 c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe 2384 22364.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\x3 = " " 22364.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\x3 = "c:\\windows\\system32\\shellext\\svchost.exe" 22364.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\shellext\svchost.exe 22364.exe File created \??\c:\windows\SysWOW64\shellext\svchost.exe 22364.exe File created C:\Windows\SysWOW64\xiaoxiao_sls.sls 22364.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2804 2384 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22364.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2384 22364.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2384 2116 c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2384 2116 c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2384 2116 c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2384 2116 c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe 29 PID 2384 wrote to memory of 2804 2384 22364.exe 30 PID 2384 wrote to memory of 2804 2384 22364.exe 30 PID 2384 wrote to memory of 2804 2384 22364.exe 30 PID 2384 wrote to memory of 2804 2384 22364.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\22364.exeC:\Users\Admin\AppData\Local\Temp\22364.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 2123⤵
- Loads dropped DLL
- Program crash
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD5ac9b708778a625263517df2b0a9588b5
SHA130373ca1e75ad4062c7accb95cf2e95090229f40
SHA256553a3773ab04876b7c3bb691159d343520dee1a206f831af0f65d82bd5d8775a
SHA5126fb1bcffee53c76c38e5f22038d7e2e41a181974214ca0463a21f45836a17f7eacdd2cfdb644fe123f9b7bef63ea47524a15819dcf206a12d4064c45e719617d
-
Filesize
208KB
MD5917b9e105c4e1554a0bb3d44f49dddae
SHA18065e670fa3ec9282df9ad44267cdfa6406c94d5
SHA256b0c5eafb89154c8c6977f036c1130e453cee22493e472d728a71c4c2e8790677
SHA512d48175b47b7bc51a6334be59ff9361b381815c300a4daee3f72a1e03fc94cd1d354c0b8e22ae528e741dd75539091d9e5993a57e7173eaae8aba89988853ff84