Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 21:02
Static task
static1
Behavioral task
behavioral1
Sample
d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe
-
Size
135KB
-
MD5
d515fa84df1722876aa4a9d73fcbe642
-
SHA1
50b31be86b86900d0e043223037f07c6779db799
-
SHA256
b1fb24e3c566427f0db98a56da92368168304a3ae1a388898c040f6618953f6f
-
SHA512
98ed8aaf10e8275518a342e321a21f7bdd70ba521b80debd62de814d109719dd6ad49d770493b367a5598109a75d7d76d52637696ae0765e4598b326c192975f
-
SSDEEP
3072:aIP7KyJDSznH9nP16SXf/3koWxTPEsvW7Y35v+bWuXYvAQ4Sy9Jmg:7j/Md5v/3WxTPrJv+iuI4QDGmg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 exzil.exe -
Loads dropped DLL 2 IoCs
pid Process 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\{68B4E0CD-5731-D5BA-3F63-1E62057A5140} = "C:\\Users\\Admin\\AppData\\Roaming\\Ebudco\\exzil.exe" exzil.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exzil.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier exzil.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe 2744 exzil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2744 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2744 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2744 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2744 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe 30 PID 2744 wrote to memory of 2660 2744 exzil.exe 31 PID 2744 wrote to memory of 2660 2744 exzil.exe 31 PID 2744 wrote to memory of 2660 2744 exzil.exe 31 PID 2744 wrote to memory of 2660 2744 exzil.exe 31 PID 2744 wrote to memory of 2660 2744 exzil.exe 31 PID 2744 wrote to memory of 2660 2744 exzil.exe 31 PID 2744 wrote to memory of 2660 2744 exzil.exe 31 PID 2744 wrote to memory of 2660 2744 exzil.exe 31 PID 2744 wrote to memory of 2660 2744 exzil.exe 31 PID 2744 wrote to memory of 2660 2744 exzil.exe 31 PID 2648 wrote to memory of 2716 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe 32 PID 2648 wrote to memory of 2716 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe 32 PID 2648 wrote to memory of 2716 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe 32 PID 2648 wrote to memory of 2716 2648 d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d515fa84df1722876aa4a9d73fcbe642_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\Ebudco\exzil.exe"C:\Users\Admin\AppData\Roaming\Ebudco\exzil.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc25c6d20.bat"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5098a80b7a5aea2082d3233b3484268c7
SHA1e5ced5dab4c5cf8e8ec589e29fe22db3c53069f2
SHA256e36e978edf6adbb0f90b0aee8fdceae229a221a4581e42c23393477eed0deeea
SHA512d72d2149224f512d4da557d5879e758ea3515827f044bcb482e5bf1044afb3c74eb6877d2f6107ff14201b884282bec2ba1176fa4b5988f0ef52f550d99812d4
-
Filesize
135KB
MD5c7e85795b63613034ada02787b75d216
SHA16a6de04fd50ff0b4e2881b6be02acef8854fdbae
SHA25690a57e1293665c27d4972edfd62e07d234f01a62f90e6ed8dcdea7fc642c805c
SHA512085a99ff8054b3d4fe85fc7af5c9720d979560dfbb5bc8874f2237ed295f023034709d14dd58d4e8e22c3e5d5dab455ee4baf42a1782b9eae8a1ff3ab814a03a