Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe
-
Size
281KB
-
MD5
d0cbd7f9826b4460d2e0e240b3b6eff5
-
SHA1
3adb6f56ab378bf58f07d6712ea2487a40dc3c49
-
SHA256
3edc656cf12a4825e02ebee70c3e1af7d6d75b1f80d92951c9f79a92f0db4ac0
-
SHA512
27e29d357b76b26f01ccebf27850a0fec8c6231fd8f5c1165d0db2a28e82bce828557b8f1b0b14adf17245e0276355da4ae2e4e65d96a6633e93770c82bd5cb6
-
SSDEEP
6144:aBj6B6kQu1WTminflPN80PxpkJP9sF2GtxvEvCO0P+:p6k+Tmin80PPesFFxMvJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2276 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 svchest.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svchest.exe d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe File opened for modification C:\Windows\svchest.exe d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe File created C:\Windows\uninstal.bat d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1724 d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe Token: SeDebugPrivilege 2172 svchest.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 svchest.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2456 2172 svchest.exe 31 PID 2172 wrote to memory of 2456 2172 svchest.exe 31 PID 2172 wrote to memory of 2456 2172 svchest.exe 31 PID 2172 wrote to memory of 2456 2172 svchest.exe 31 PID 1724 wrote to memory of 2276 1724 d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe 32 PID 1724 wrote to memory of 2276 1724 d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe 32 PID 1724 wrote to memory of 2276 1724 d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe 32 PID 1724 wrote to memory of 2276 1724 d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe 32 PID 1724 wrote to memory of 2276 1724 d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe 32 PID 1724 wrote to memory of 2276 1724 d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe 32 PID 1724 wrote to memory of 2276 1724 d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0cbd7f9826b4460d2e0e240b3b6eff5_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Windows\svchest.exeC:\Windows\svchest.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5d0cbd7f9826b4460d2e0e240b3b6eff5
SHA13adb6f56ab378bf58f07d6712ea2487a40dc3c49
SHA2563edc656cf12a4825e02ebee70c3e1af7d6d75b1f80d92951c9f79a92f0db4ac0
SHA51227e29d357b76b26f01ccebf27850a0fec8c6231fd8f5c1165d0db2a28e82bce828557b8f1b0b14adf17245e0276355da4ae2e4e65d96a6633e93770c82bd5cb6
-
Filesize
218B
MD5529a30ebd5d49f942870054a3ed5e926
SHA1d5d222b66b63deefde424482eb36f8d9f5cce350
SHA25609e0beff6a84993443e233633cfa9f77e956470070545b855101f4fe4d3aebd6
SHA5122ac6a8b2d370e42d7774688c4215a4a34877979cf443546696c2065b05feda795c1bfbcbe2b07c59b3e35ac6fa2ad4815bfefcbad434130834266f6c6e40bf09