Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
d26b987bace8107b211f439082935784_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d26b987bace8107b211f439082935784_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d26b987bace8107b211f439082935784_JaffaCakes118.exe
-
Size
301KB
-
MD5
d26b987bace8107b211f439082935784
-
SHA1
47a37aa69cc416df4506588b83c5417bbb81b4ce
-
SHA256
9d118e4f421dec8a5f37d1c995909da8695eaaf7bd506a9b1d1a6ae0c9a8cd62
-
SHA512
40c9f310843d446c2abab649e0d935109be03e310f88c369a5fa7122a875c281f49e5bc4d37b744d70207df120dab11c2e69de9e9407e556d0874e8c69ba5d94
-
SSDEEP
6144:nJEYERqaQiEYixXAkmOgoUpMEEdlntRb5A+na4S34EQwZ:J5+qntJxjfg5mxdltZ5A+na4iQwZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1640 svohst.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\svohst.exe d26b987bace8107b211f439082935784_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svohst.exe d26b987bace8107b211f439082935784_JaffaCakes118.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat d26b987bace8107b211f439082935784_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d26b987bace8107b211f439082935784_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2316 1640 svohst.exe 88 PID 1640 wrote to memory of 2316 1640 svohst.exe 88 PID 1640 wrote to memory of 2316 1640 svohst.exe 88 PID 2792 wrote to memory of 1376 2792 d26b987bace8107b211f439082935784_JaffaCakes118.exe 90 PID 2792 wrote to memory of 1376 2792 d26b987bace8107b211f439082935784_JaffaCakes118.exe 90 PID 2792 wrote to memory of 1376 2792 d26b987bace8107b211f439082935784_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d26b987bace8107b211f439082935784_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d26b987bace8107b211f439082935784_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\SysWOW64\svohst.exe -NetSata1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104B
MD52eec7e3ae21b6acc8fb8cf0a2f7323aa
SHA10e6a8a87b7c2848ffec860a6955a44a2c166ad9b
SHA25678d9742426f406d30f8379f240e595b8ab937b48bc9b0b5099e7e9ecfaa9fac2
SHA512e13fae2b008a4eb4b88ade4e516d8c8d2521c1c88b53fd4f62863673ade296e708c5b128f1b5b79b18d78f0ed3c94a892207841b664c057a2617ab97aa8bf281
-
Filesize
212B
MD5138cffe0bde4f2eee14d23b13599eb0b
SHA15dcf208ba4c490368ccf59655e476e0e7548109d
SHA256d359045908baf7db3ab6dc2c43864229cb9d529efd2b36f30af2f32eac4d7855
SHA512572ad10a44cd0c8c4443d8bd197febb937b37a585fe3855a3a1204f53bb0b71dc87bb0a96220d4214113650417348cae189c964ccfbe7eade02103fed4dd5e88
-
Filesize
301KB
MD5d26b987bace8107b211f439082935784
SHA147a37aa69cc416df4506588b83c5417bbb81b4ce
SHA2569d118e4f421dec8a5f37d1c995909da8695eaaf7bd506a9b1d1a6ae0c9a8cd62
SHA51240c9f310843d446c2abab649e0d935109be03e310f88c369a5fa7122a875c281f49e5bc4d37b744d70207df120dab11c2e69de9e9407e556d0874e8c69ba5d94