Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
ce475c0428014f15a4c657c10eaa5920
-
SHA1
5ed0342c4f5b4c4cc39f3410dc6dc4a9dfdf22e6
-
SHA256
32da3e8f5ef8be9740016a2a33be43382907e8169ced6fbfaf041b2f464144e0
-
SHA512
6b49e54de93f1a69a054c3e254436694c4d7f14027a050a7918c80241aed23fb33042f7dc68a53a95a9bc1099081cbc5fafae0f79ca16fefd98945010e0a4a86
-
SSDEEP
24576:KG7wIlKT4tX1Yw8kEtNt+Zwx0jFYb1ZH/:KKYnxtV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2260 gnv3MlbfpV.exe 1532 gnv3MlbfpV.exe -
Loads dropped DLL 4 IoCs
pid Process 2136 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 2136 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 2136 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 1532 gnv3MlbfpV.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\59c8svJ96Egh0l = "C:\\ProgramData\\BEUeLksdH9zgnHBY\\gnv3MlbfpV.exe" ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1568 set thread context of 2136 1568 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 30 PID 2260 set thread context of 1532 2260 gnv3MlbfpV.exe 32 PID 1532 set thread context of 2736 1532 gnv3MlbfpV.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnv3MlbfpV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnv3MlbfpV.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2136 1568 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 30 PID 1568 wrote to memory of 2136 1568 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 30 PID 1568 wrote to memory of 2136 1568 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 30 PID 1568 wrote to memory of 2136 1568 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 30 PID 1568 wrote to memory of 2136 1568 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 30 PID 1568 wrote to memory of 2136 1568 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 30 PID 2136 wrote to memory of 2260 2136 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 31 PID 2136 wrote to memory of 2260 2136 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 31 PID 2136 wrote to memory of 2260 2136 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 31 PID 2136 wrote to memory of 2260 2136 ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe 31 PID 2260 wrote to memory of 1532 2260 gnv3MlbfpV.exe 32 PID 2260 wrote to memory of 1532 2260 gnv3MlbfpV.exe 32 PID 2260 wrote to memory of 1532 2260 gnv3MlbfpV.exe 32 PID 2260 wrote to memory of 1532 2260 gnv3MlbfpV.exe 32 PID 2260 wrote to memory of 1532 2260 gnv3MlbfpV.exe 32 PID 2260 wrote to memory of 1532 2260 gnv3MlbfpV.exe 32 PID 1532 wrote to memory of 2736 1532 gnv3MlbfpV.exe 33 PID 1532 wrote to memory of 2736 1532 gnv3MlbfpV.exe 33 PID 1532 wrote to memory of 2736 1532 gnv3MlbfpV.exe 33 PID 1532 wrote to memory of 2736 1532 gnv3MlbfpV.exe 33 PID 1532 wrote to memory of 2736 1532 gnv3MlbfpV.exe 33 PID 1532 wrote to memory of 2736 1532 gnv3MlbfpV.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce475c0428014f15a4c657c10eaa5920_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\ProgramData\BEUeLksdH9zgnHBY\gnv3MlbfpV.exe"C:\ProgramData\BEUeLksdH9zgnHBY\gnv3MlbfpV.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\ProgramData\BEUeLksdH9zgnHBY\gnv3MlbfpV.exe"C:\ProgramData\BEUeLksdH9zgnHBY\gnv3MlbfpV.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe" /i:15325⤵PID:2736
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5ce475c0428014f15a4c657c10eaa5920
SHA15ed0342c4f5b4c4cc39f3410dc6dc4a9dfdf22e6
SHA25632da3e8f5ef8be9740016a2a33be43382907e8169ced6fbfaf041b2f464144e0
SHA5126b49e54de93f1a69a054c3e254436694c4d7f14027a050a7918c80241aed23fb33042f7dc68a53a95a9bc1099081cbc5fafae0f79ca16fefd98945010e0a4a86