Analysis
-
max time kernel
78s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
d02ebcddf4b219d0b19d780f2006d92a
-
SHA1
d81e9704c45d7899711ef5bd346748bf1bb28256
-
SHA256
1d8f7331e7f515f348707bf8d2fe9edb223bdfe1700a47cc0a1732a5291c9990
-
SHA512
eea07f3adff8d8d1e4498f4e54114efea47713a6088d648be014cb3b1ff50cc061f2648f535a1c75b8ceb8e9eb8b7a553e52bfa065cfe40cd354c1394717f491
-
SSDEEP
24576:Mv1yyMWlFTZY+TPnGB1dpHYvEwMisGvRrq2ajiswTP+25iP7N0:EAyMWl/jOLdKMwMiR8Rji/+VN0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2484 ~ -
Use of msiexec (install) with remote resource 1 IoCs
pid Process 4824 MSIEXEC.EXE -
Blocklisted process makes network request 1 IoCs
flow pid Process 7 4824 MSIEXEC.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2800 set thread context of 2484 2800 d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIEXEC.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4824 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 4824 MSIEXEC.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4824 MSIEXEC.EXE 4824 MSIEXEC.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2484 2800 d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe 85 PID 2800 wrote to memory of 2484 2800 d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe 85 PID 2800 wrote to memory of 2484 2800 d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe 85 PID 2800 wrote to memory of 2484 2800 d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe 85 PID 2800 wrote to memory of 2484 2800 d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe 85 PID 2484 wrote to memory of 4824 2484 ~ 89 PID 2484 wrote to memory of 4824 2484 ~ 89 PID 2484 wrote to memory of 4824 2484 ~ 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d02ebcddf4b219d0b19d780f2006d92a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\~C:\Users\Admin\AppData\Local\Temp\~2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\MSIEXEC.EXEMSIEXEC.EXE /i "http://download.realtimegaming.com/cdn/slotsplus/Slots Plus Casino20100803112731.msi" DDC_DID=1034588 DDC_RTGURL=http://216.93.176.186/dl/TrackSetup/TrackSetup.aspx?DID=1034588%26filename=SlotsPlus%2Eexe SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="~"3⤵
- Use of msiexec (install) with remote resource
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD536affbd6ff77d1515cfc1c5e998fbaf9
SHA1950d00ecc2e7fd2c48897814029e8eedf6397838
SHA256fccc7f79d29318d8ae78850c262bac762c28858709a6e6cf3b62bcd2729a61e3
SHA5122f29de86d486db783872581a43a834e5064d1488bc3f085ddc5a3287eb9ee8a4ce93d66f7b4965cafb3c4f06b38d4b0fcfdc0fcb1f99d61331a808e5d6011808
-
Filesize
20B
MD5db9af7503f195df96593ac42d5519075
SHA11b487531bad10f77750b8a50aca48593379e5f56
SHA2560a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13
SHA5126839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b
-
Filesize
904KB
MD531343b4530d32463ec51a4e89f9145b6
SHA116df0f4e8f50b3036629f2497b3aefba21a0c839
SHA2566d3a97f2610a6a550c0dd038bcf5fd91c8e82131e0671decc54ebdec51a47147
SHA512d89bd47cfa338aa3bf7584fb208b2ce650f2e33881b64da07b449ea2206841447b247a3bab7387ddf351fc3d3e5595f09dfbb041f1e23ecdeb5cf859e78096e2
-
Filesize
5KB
MD5ee98cfef6a2592bc6552e1fa64eabd75
SHA12b95913216543fb774a48f8a871c0cf19bced24f
SHA2562052822d6d6791e4e479e397e98e25bb146d8f8b08b94e31deb547a29e5fda92
SHA512018f77dd6328a466d7110d284c31768ee26a3fe982a3b11df513aa76b3b9fc64459e86b11073a3374be17aa77bb013d1981a811396b1e8a604104e092d8ba0d2