Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
d6f9c02511b899fc73b32d0e7e012528
-
SHA1
2ca8e690ec7defb1cae50816fca969177a6d23a4
-
SHA256
5c2b858e5d2fcbe4c1baf91e36ebdc2f8eb2ba49f4cade6a5443c5af0cf463fe
-
SHA512
f496e7d66a83620e424a31f8e57dd5d30d9be5bc554d7ac058b889b6416f463e7f171f65db23962e3167ad967fa019e696e0bd51b07a737ca4f46fcbbc30b305
-
SSDEEP
49152:3dOjNXMu8VaWg/IbwsYCxUGXET3pb2uQUr3ZAK6SQKS:NOjtMaWZbxUfT3gu3r3ZAn
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Cloud AV 2012v121.exe -
Executes dropped EXE 2 IoCs
pid Process 3276 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe -
resource yara_rule behavioral2/memory/3044-1-0x0000000000400000-0x0000000000914000-memory.dmp upx behavioral2/memory/3044-2-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral2/memory/3044-7-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral2/memory/3044-8-0x0000000000400000-0x0000000000914000-memory.dmp upx behavioral2/memory/3276-11-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral2/memory/3276-17-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral2/memory/2092-83-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral2/memory/2092-100-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral2/memory/2092-120-0x0000000000400000-0x0000000000917000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RJ7dEL8gTqYwIr8234A = "C:\\Windows\\system32\\Cloud AV 2012v121.exe" d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\KBtzPNycAiDoF8234A = "C:\\Users\\Admin\\AppData\\Roaming\\NrlONtxP0c2b3n5\\Cloud AV 2012v121.exe" Cloud AV 2012v121.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cloud AV 2012v121.exe d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe File created C:\Windows\SysWOW64\Cloud AV 2012v121.exe Cloud AV 2012v121.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cloud AV 2012v121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cloud AV 2012v121.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3276 Cloud AV 2012v121.exe 3276 Cloud AV 2012v121.exe 3276 Cloud AV 2012v121.exe 3276 Cloud AV 2012v121.exe 3276 Cloud AV 2012v121.exe 3276 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2356 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3044 d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe 3276 Cloud AV 2012v121.exe 3276 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe 2092 Cloud AV 2012v121.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3276 3044 d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe 86 PID 3044 wrote to memory of 3276 3044 d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe 86 PID 3044 wrote to memory of 3276 3044 d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe 86 PID 3276 wrote to memory of 2092 3276 Cloud AV 2012v121.exe 87 PID 3276 wrote to memory of 2092 3276 Cloud AV 2012v121.exe 87 PID 3276 wrote to memory of 2092 3276 Cloud AV 2012v121.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Cloud AV 2012v121.exeC:\Windows\system32\Cloud AV 2012v121.exe 5985C:\Users\Admin\AppData\Local\Temp\d6f9c02511b899fc73b32d0e7e012528_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Roaming\NrlONtxP0c2b3n5\Cloud AV 2012v121.exeC:\Users\Admin\AppData\Roaming\NrlONtxP0c2b3n5\Cloud AV 2012v121.exe 5985C:\Windows\SysWOW64\Cloud AV 2012v121.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2092
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612B
MD51bde6f592b41508d2dde890dd153e865
SHA10840a12dbd32f01c8d6fc8dc548ce3142505d9a1
SHA256d70c4f234780dfe3c31aae699fb52a0a96b9171eaca9047cb026e1792fb99828
SHA512346a61a517d83ea34c79401e74f92494e967b22ddcfbf98b455d5713b5acb0cba9c5acee57500db9564bd2280561de61901a1d326e932fb8980767ef5e10fdf2
-
Filesize
1KB
MD5b833527ce59896fb50d850466890686f
SHA196f58bfbd84de5ce3c94a051cf40c220de500c51
SHA2562f78a68c2a15303e6643a9e3232e6d5a762da16685c6fb82406144c14980b445
SHA512fae7f11789cc12f2e7cb9645da6996f7282499be992152f4597ea7649325d247d73e608bfee62aebdda510f57556b436109618f3d9328d7cf34ac69188bb822f
-
Filesize
1.9MB
MD5d6f9c02511b899fc73b32d0e7e012528
SHA12ca8e690ec7defb1cae50816fca969177a6d23a4
SHA2565c2b858e5d2fcbe4c1baf91e36ebdc2f8eb2ba49f4cade6a5443c5af0cf463fe
SHA512f496e7d66a83620e424a31f8e57dd5d30d9be5bc554d7ac058b889b6416f463e7f171f65db23962e3167ad967fa019e696e0bd51b07a737ca4f46fcbbc30b305
-
Filesize
1KB
MD550ab0dd716dd66ad0c3eb5fb63f2f118
SHA1bd9641078264b2135d3b3b0007c98f977d057960
SHA2561f9037b078250201c92f8e1ea1ad3023011039c76a5aa74d3710edc452fc6517
SHA51224c0b8ca8650fb50f81b9a89bbb7e8e5492b303b065fbf846c55aeb76c9fc41ebb5b9c6163d168a1362941720473486fdf2596dab4764176ebb348ad264b61d6