Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe
-
Size
33KB
-
MD5
ceb006de325ff4e59ef29b36ebf5542c
-
SHA1
e7c5f4434a5f1ab8c1ee95d633e7346e14f88fdf
-
SHA256
001ed6f033379beff996b353657e1106eff33dbbd5cbf8df70beaf9fd82d72a8
-
SHA512
301f1d7666c5fad7a15304363d5f09656c985fa91846c4154302e32049e0eb0580423a4f2e1c9e6ee26c8e3b4f2b0ac61d879950ca03167deb9656095c616a5a
-
SSDEEP
768:dYGHFaaDakfpYnPBhuSp5Bm1hPlImmCZBxzAp6Ztp6AaK5FW:dYGlaaDakf2Sw58lfpZtcAx5F
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2400 cmd.exe -
resource yara_rule behavioral1/memory/2108-1-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2108-76-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2108 ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe 2108 ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2108 ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2400 2108 ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe 31 PID 2108 wrote to memory of 2400 2108 ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe 31 PID 2108 wrote to memory of 2400 2108 ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe 31 PID 2108 wrote to memory of 2400 2108 ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ceb006de325ff4e59ef29b36ebf5542c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\CEB006~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NQU8S4LJ\cvwzn[1].htm
Filesize134B
MD54aa7a432bb447f094408f1bd6229c605
SHA11965c4952cc8c082a6307ed67061a57aab6632fa
SHA25634ccdc351dc93dbf30a8630521968421091e3ed19c31a16e32c2eabb55c6a73a
SHA512497ba6d8ec6bf2267fe6133a432f0e9ab12b982c06bb23e3de6e5a94d036509d2556ba822e3989d8cd7e240d9bae8096fc5be8a948e3e29fe29cab1fea1fe31c
-
Filesize
16KB
MD57bddea8ca6b611010b5d31e61b834c39
SHA12ab4a820249f58fe97f37d7944a2820df6a443e8
SHA256502a57af7ee1f133e00b11064f5a277d0d2dcfd549db8a42f0fd7853b1885517
SHA512fd98774e7f7dafc36f58cd0a1f2b3109dff713a9dea5ffe82e7337ac1dda49993723204a3918569c1183eb5221db9a2194a71766c14db601180c49d4195f598f
-
Filesize
64KB
MD516b4e126d43932fb574916c280a4d63d
SHA1b148d47fab8c2064b61e968293c342475230e81f
SHA256137e1f7fa833081bc2a348bccfcf136c49a6497adf7760a1edf0c79677e4d32d
SHA512576a87ed8fca31db9c1b70e20536c01f0eea743bf45e9f8cf5ce91cc6f686f0c56ba62f0e14e5e5fbc69ebffd4044c9df8e3cecf150959978a9748434daf38f7