Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe
-
Size
648KB
-
MD5
d788ba943b394d424d299dfb8f23414b
-
SHA1
21290954dcd33151df7d8d40ba83949597987148
-
SHA256
db675239b6c82f4e25ae10bc6fab2dd1b90db0f06ee136d7eefb73e0fe8f268d
-
SHA512
6a94e9f30e32d3712dc81f2303cd3003195d17966a6077d21c1e44de6ebd9610bb9e67d6181356fdcfebf1a9f71b89ddcdf214fedda166e51e4d050629348f84
-
SSDEEP
12288:fwltpc6P6jeiwltpc6P6jeB169AjbB5tZfQuJtr54gM102u:Ilrc6P6jAlrc6P6jK0IBvmalDM
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\java.lnk java.exe -
Executes dropped EXE 1 IoCs
pid Process 2836 java.exe -
Loads dropped DLL 2 IoCs
pid Process 2788 cmd.exe 2836 java.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2836 set thread context of 1664 2836 java.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language java.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1804 d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe Token: SeDebugPrivilege 2836 java.exe Token: SeDebugPrivilege 1664 vbc.exe Token: 33 1664 vbc.exe Token: SeIncBasePriorityPrivilege 1664 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1664 vbc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2644 1804 d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe 31 PID 1804 wrote to memory of 2644 1804 d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe 31 PID 1804 wrote to memory of 2644 1804 d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe 31 PID 1804 wrote to memory of 2644 1804 d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe 31 PID 1804 wrote to memory of 2788 1804 d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2788 1804 d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2788 1804 d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2788 1804 d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe 33 PID 2788 wrote to memory of 2836 2788 cmd.exe 35 PID 2788 wrote to memory of 2836 2788 cmd.exe 35 PID 2788 wrote to memory of 2836 2788 cmd.exe 35 PID 2788 wrote to memory of 2836 2788 cmd.exe 35 PID 2788 wrote to memory of 2836 2788 cmd.exe 35 PID 2788 wrote to memory of 2836 2788 cmd.exe 35 PID 2788 wrote to memory of 2836 2788 cmd.exe 35 PID 2836 wrote to memory of 1664 2836 java.exe 36 PID 2836 wrote to memory of 1664 2836 java.exe 36 PID 2836 wrote to memory of 1664 2836 java.exe 36 PID 2836 wrote to memory of 1664 2836 java.exe 36 PID 2836 wrote to memory of 1664 2836 java.exe 36 PID 2836 wrote to memory of 1664 2836 java.exe 36 PID 2836 wrote to memory of 1664 2836 java.exe 36 PID 2836 wrote to memory of 1664 2836 java.exe 36 PID 2836 wrote to memory of 1664 2836 java.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\d788ba943b394d424d299dfb8f23414b_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\java.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\java.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\java.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\java.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1664
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648KB
MD5d788ba943b394d424d299dfb8f23414b
SHA121290954dcd33151df7d8d40ba83949597987148
SHA256db675239b6c82f4e25ae10bc6fab2dd1b90db0f06ee136d7eefb73e0fe8f268d
SHA5126a94e9f30e32d3712dc81f2303cd3003195d17966a6077d21c1e44de6ebd9610bb9e67d6181356fdcfebf1a9f71b89ddcdf214fedda166e51e4d050629348f84