Analysis
-
max time kernel
138s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2024, 16:04
Static task
static1
Behavioral task
behavioral1
Sample
cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe
-
Size
38KB
-
MD5
cb2c2a201d3e3503672cfabf04cb0dd6
-
SHA1
b4888883e356b94e488397b4f722ddeba42ea0f6
-
SHA256
2bfb6fb08b43a87570b5a28019453f83ae4ccdb6697a0b8971622a286b1c4427
-
SHA512
02d6a59b71a3a5ff699c5433ccb840d074c0a2a28e08d43b92ac175b8292d28115e9e4faaedb5abf72c4f047db7d5e4de15b2a68f74ff3d6086582be9c381c21
-
SSDEEP
384:YOkcDO2WckpaO34X8V0wBcbfEQ4XvMAhk7Sq2CDeCL2OalwklH1KzLjEMt4jgaEf:mcDO2PkpfIXBbKLq9RYlwklYzzmgm5U
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 winservice.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE winservice.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies winservice.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 winservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winservice.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix winservice.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" winservice.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" winservice.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 232 winservice.exe 232 winservice.exe 232 winservice.exe 232 winservice.exe 232 winservice.exe 232 winservice.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3488 cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1464 wrote to memory of 3488 1464 cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe 85 PID 1464 wrote to memory of 3488 1464 cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe 85 PID 1464 wrote to memory of 3488 1464 cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe 85 PID 2952 wrote to memory of 232 2952 winservice.exe 89 PID 2952 wrote to memory of 232 2952 winservice.exe 89 PID 2952 wrote to memory of 232 2952 winservice.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb2c2a201d3e3503672cfabf04cb0dd6_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3488
-
-
C:\Windows\SysWOW64\winservice.exeC:\Windows\SysWOW64\winservice.exe1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\winservice.exe"C:\Windows\SysWOW64\winservice.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:232
-