Analysis
-
max time kernel
148s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
d27edfefdfb01a6244e4cab4c633183d
-
SHA1
7cf96540cf4033429f19a8c5ada3c357a5959459
-
SHA256
461f67d22c25b4169077a4deda107be0408429e1dfa95146f0e025ded9c7f654
-
SHA512
eaed04fa5d212cd9a3469ebde13be45a167214cc94294be984fc835b356d45a824391d4d097ce9ed5ac5ebc8488e8f1a27d799dacf2a8f95c289c4d00558caab
-
SSDEEP
24576:fa109AGa8VAy0V8NGp7eeZWIUNdu89GaxZ:GNGa8+hVT75W7du2Gaj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4752 svchost.exe 4292 d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe 1240 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 4292 d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe 4292 d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe 4292 d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe svchost.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4208 wrote to memory of 4752 4208 d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe 85 PID 4208 wrote to memory of 4752 4208 d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe 85 PID 4208 wrote to memory of 4752 4208 d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe 85 PID 4752 wrote to memory of 4292 4752 svchost.exe 87 PID 4752 wrote to memory of 4292 4752 svchost.exe 87 PID 4752 wrote to memory of 4292 4752 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d27edfefdfb01a6244e4cab4c633183d_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4292
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5625214a1c57538359244dab9fac4636f
SHA14f41779fb53c71c38161cfe60bf2d91b42033678
SHA256810bba54c92479bb47574bc214911bf310f0e98800bc33cdeff35a5e13c82ac9
SHA512d166443eead29f623f3e0e558c5a9c560e0d55d4602fa5f78f80bc1147f5533b54da9b481504828871954c5c96a69015cfdbe50beb791e6e1e1d0c26b52752b2
-
Filesize
37KB
MD57d179e580725090268424a536d021e9c
SHA17ca5f3d4b32c7cce1668f25ea3b726d8c7df15e8
SHA2569a06ea098987dad25f1a255d8881a20ade5177c037b656a5c4aa8b51424d283b
SHA5128584fb44b529f76b8bad44eef6e616bf47916290cec929251c33c822c7f7d267b5469874cf152516d2a44b3fcb3f021e1b0b853cbe7038bb7a5ec02d599eefd5
-
Filesize
1.1MB
MD52d362b8915a85c8043ba4645eb51bf44
SHA16ee124d40606376685488a8142ddd5fa3b116b5b
SHA2568bdee56694392e9edc2be37dade14d15086f80956b46f9c4391b1d0d711bf4ef
SHA512e805569ea82c86d401ee0845a74b970228ae00b1927234e89ec0dff63cb13fddcb94ebc446219708d8c1940b84825f21a23caf925c09ef9a6070341da350a6dc
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b