Analysis
-
max time kernel
94s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 18:36
Behavioral task
behavioral1
Sample
c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe
-
Size
105KB
-
MD5
c96432ae07371e4e4611af37db941dcd
-
SHA1
c05746baf04951491128300108e423051924f319
-
SHA256
50582c489f8c3ea28734dc26744eb6faa758e51a2c6d25d60412c20f2b040cc5
-
SHA512
7dc2c56a148fc04488909fa3d00627a494a5ead3c78c8b470b125e1904790c6c4dd4ac16f041fa0ff7f25d0d2b4b98a722f8d74e3c7d0b8473b0a8819fb96b45
-
SSDEEP
1536:fjeJLBHOnJMUQcaDHs7x0iTh9ej0pT3XG5PZX2CrcaqnV:fjS90ecabuxjTmAtYZX2CYH
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\aec.sys c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Drivers\aec.sys 20255.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 20255.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 20255.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\x3 = " " 20255.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\x3 = "c:\\windows\\system32\\shellext\\svchost.exe" 20255.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xiaoxiao_sls.sls 20255.exe File opened for modification \??\c:\windows\SysWOW64\shellext\svchost.exe 20255.exe File created \??\c:\windows\SysWOW64\shellext\svchost.exe 20255.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4680 2756 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20255.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2756 20255.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2756 2860 c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe 90 PID 2860 wrote to memory of 2756 2860 c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe 90 PID 2860 wrote to memory of 2756 2860 c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c96432ae07371e4e4611af37db941dcd_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\20255.exeC:\Users\Admin\AppData\Local\Temp\20255.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 4003⤵
- Program crash
PID:4680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2756 -ip 27561⤵PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD5ac9b708778a625263517df2b0a9588b5
SHA130373ca1e75ad4062c7accb95cf2e95090229f40
SHA256553a3773ab04876b7c3bb691159d343520dee1a206f831af0f65d82bd5d8775a
SHA5126fb1bcffee53c76c38e5f22038d7e2e41a181974214ca0463a21f45836a17f7eacdd2cfdb644fe123f9b7bef63ea47524a15819dcf206a12d4064c45e719617d
-
Filesize
208KB
MD5917b9e105c4e1554a0bb3d44f49dddae
SHA18065e670fa3ec9282df9ad44267cdfa6406c94d5
SHA256b0c5eafb89154c8c6977f036c1130e453cee22493e472d728a71c4c2e8790677
SHA512d48175b47b7bc51a6334be59ff9361b381815c300a4daee3f72a1e03fc94cd1d354c0b8e22ae528e741dd75539091d9e5993a57e7173eaae8aba89988853ff84