Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe
-
Size
139KB
-
MD5
ce0f5126685018dc34bf74ccb414baf9
-
SHA1
97d51925a8900014def31b397efb7dbc05a9dd36
-
SHA256
c92a69107302dc1d19604fe14a5d7dc1e5d55df11876e56f3bbe63a251b4166b
-
SHA512
43fc8b332517846cfb7a10f42ccb3b40fb0eb98c407098ea1ea1911337fb430e15db8cad5c53c57c18bb96e4898caf28d003c9d3b142c299782ba8fa84cb6555
-
SSDEEP
3072:w6wyam7CzR54cNlixcZjrSYeRmtlSh7Af/aiI0:Vv7W4cNhNaulS0SiI0
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 352 netsh.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eoqyx.exe ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eoqyx.exe ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eoqyx.exe gbbgkp.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eoqyx.exe gbbgkp.exe -
Executes dropped EXE 2 IoCs
pid Process 2008 gbbgkp.exe 2700 gbbgkp.exe -
Loads dropped DLL 1 IoCs
pid Process 1768 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hmopcgjl = "C:\\Users\\Admin\\AppData\\Local\\gbbgkp.exe" ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmopcgjl = "C:\\Users\\Admin\\AppData\\Local\\gbbgkp.exe" ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hmopcgjl = "C:\\Users\\Admin\\AppData\\Local\\gbbgkp.exe" gbbgkp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmopcgjl = "C:\\Users\\Admin\\AppData\\Local\\gbbgkp.exe" gbbgkp.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2276 set thread context of 1768 2276 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 28 PID 2008 set thread context of 2700 2008 gbbgkp.exe 33 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gbbgkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gbbgkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1768 2276 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1768 2276 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1768 2276 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1768 2276 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1768 2276 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1768 2276 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1768 2276 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1768 2276 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 28 PID 1768 wrote to memory of 352 1768 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 29 PID 1768 wrote to memory of 352 1768 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 29 PID 1768 wrote to memory of 352 1768 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 29 PID 1768 wrote to memory of 352 1768 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 29 PID 1768 wrote to memory of 2008 1768 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 30 PID 1768 wrote to memory of 2008 1768 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 30 PID 1768 wrote to memory of 2008 1768 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 30 PID 1768 wrote to memory of 2008 1768 ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2700 2008 gbbgkp.exe 33 PID 2008 wrote to memory of 2700 2008 gbbgkp.exe 33 PID 2008 wrote to memory of 2700 2008 gbbgkp.exe 33 PID 2008 wrote to memory of 2700 2008 gbbgkp.exe 33 PID 2008 wrote to memory of 2700 2008 gbbgkp.exe 33 PID 2008 wrote to memory of 2700 2008 gbbgkp.exe 33 PID 2008 wrote to memory of 2700 2008 gbbgkp.exe 33 PID 2008 wrote to memory of 2700 2008 gbbgkp.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ce0f5126685018dc34bf74ccb414baf9_JaffaCakes118.exe2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram 1.exe 1 ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:352
-
-
C:\Users\Admin\AppData\Local\gbbgkp.exe"C:\Users\Admin\AppData\Local\gbbgkp.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\gbbgkp.exeC:\Users\Admin\AppData\Local\gbbgkp.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5ce0f5126685018dc34bf74ccb414baf9
SHA197d51925a8900014def31b397efb7dbc05a9dd36
SHA256c92a69107302dc1d19604fe14a5d7dc1e5d55df11876e56f3bbe63a251b4166b
SHA51243fc8b332517846cfb7a10f42ccb3b40fb0eb98c407098ea1ea1911337fb430e15db8cad5c53c57c18bb96e4898caf28d003c9d3b142c299782ba8fa84cb6555