Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe
-
Size
745KB
-
MD5
cf7381b0254759e359bf34c3aa78a4cf
-
SHA1
07f2f2e6ddf2478baf9f9ce672218731f8ed8c87
-
SHA256
682370b6fd7fc9000864bc453d39c575fdaec4ec5be06bd36f505494e3212159
-
SHA512
fe6b3d1a803e1643226f79b552a91cf83bb09ae1ffacdd60272828d15734195353ef586cd64b91b6e0151702a2609f13b64ba16b1800260cf030ce3552c883fe
-
SSDEEP
12288:5cjVR9//E2TZ6jmDwvdn0vzH/OolwEMzMSAYpGZz0svFnd:aVR9//pFJs0vr/OoGa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 qq.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\qq.exe cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe File created C:\Windows\61642520.BAT cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe File created C:\Windows\qq.exe cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2224 cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe Token: SeDebugPrivilege 2660 qq.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 qq.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2684 2660 qq.exe 31 PID 2660 wrote to memory of 2684 2660 qq.exe 31 PID 2660 wrote to memory of 2684 2660 qq.exe 31 PID 2660 wrote to memory of 2684 2660 qq.exe 31 PID 2224 wrote to memory of 2784 2224 cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe 32 PID 2224 wrote to memory of 2784 2224 cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe 32 PID 2224 wrote to memory of 2784 2224 cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe 32 PID 2224 wrote to memory of 2784 2224 cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf7381b0254759e359bf34c3aa78a4cf_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\61642520.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\qq.exeC:\Windows\qq.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD58b5fd4ada0876c5eafd2c123593562fe
SHA18eae8fe17e1ed60e363009b1b3750c812003ba66
SHA25668066854482e0db75fed2d227aa5b310a6942b2d02b713a9329f13a68e5e8a59
SHA5125ebb0950752e0b7e6e61e41b5793367aa5ff3b3dcb2a124ccd1d18d0958444ca70b5487a3769588a68dec7c77bec4545e3d417845a7015d8ab4a6b3a85cea147
-
Filesize
745KB
MD5cf7381b0254759e359bf34c3aa78a4cf
SHA107f2f2e6ddf2478baf9f9ce672218731f8ed8c87
SHA256682370b6fd7fc9000864bc453d39c575fdaec4ec5be06bd36f505494e3212159
SHA512fe6b3d1a803e1643226f79b552a91cf83bb09ae1ffacdd60272828d15734195353ef586cd64b91b6e0151702a2609f13b64ba16b1800260cf030ce3552c883fe