Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe
-
Size
164KB
-
MD5
d001e3a4b021c7f2b9b623b2277597d6
-
SHA1
8b30c031ff658f08b3cc15120ab941b0014de302
-
SHA256
3b4d75ada68e20f28d5e8f87ceb0d3f91161b9dd30c5779b457ca950d6f2aa2b
-
SHA512
27a0ff8a395afd2011b7526127899ddd60023cef101865543deea77016a9eaedc3c5834641df20702210bcd59e294a8c5fea3172f810613850f4fd0599236ab7
-
SSDEEP
3072:JJKvNR9cbdBKgLsZ0bu3eEwicSg0gVg7w32avurqZX1Ax+YajYUQ:ATcbAubocicSg0U3FvurqUmYU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2804 sam.exe 2836 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 2804 sam.exe 2804 sam.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lsass.exe" sam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lsass.exe" sam.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\sam.exe d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sam.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2324 d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2804 2324 d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2804 2324 d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2804 2324 d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2804 2324 d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe 29 PID 2804 wrote to memory of 2836 2804 sam.exe 30 PID 2804 wrote to memory of 2836 2804 sam.exe 30 PID 2804 wrote to memory of 2836 2804 sam.exe 30 PID 2804 wrote to memory of 2836 2804 sam.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d001e3a4b021c7f2b9b623b2277597d6_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\sam.exe"C:\Program Files\sam.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\lsass.exe"C:\Users\Admin\AppData\Local\Temp\lsass.exe"3⤵
- Executes dropped EXE
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5a1c46947446effac0f11648200eb0945
SHA11888afdd1cf084ab7e011948d512b848ae5a6e17
SHA25639b4d79f61d80e41f4b88a4e9d0a993b702c9959c39d8e4ecc5d3d7a184f5075
SHA512951f6a46871d07380322ce570f3c2dcbe59a72b4318087b3cc895fc3dddfd7c0d409554a012aac7dbc4001d9d7de9a82f60f901e3af9b6ad29570d5018b7fc41