Analysis
-
max time kernel
142s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe
-
Size
712KB
-
MD5
db49b04ed42731bed33b51099e29d26c
-
SHA1
6a54575c368a7336cbdac132d35dd8bd30f4ad66
-
SHA256
766f42ef27903a9a3b23b4187c5e90029e4530f7f9e5712c1b2535649358395c
-
SHA512
f29f116812a839bd59814ecf3485f181e9edea7df0f64bfaec18b7b85c6f513205d445bb3c6965d8ba2ec4a3a608d1cd72c341261e9576a92e1b68c39e716453
-
SSDEEP
12288:Zmg/mrtqB/W1yZPOgwQblMEEe62WdWS81F3Z4mxxmoEtlK+kt9T2MZ9:ZmgOrtqBiUs3h4QmX/Gw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2536 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 SVCHOST.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\SVCHOST.exe db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe File opened for modification C:\Windows\SVCHOST.exe db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe File created C:\Windows\UNINSTAL.BAT db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1756 db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe Token: SeDebugPrivilege 2956 SVCHOST.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 SVCHOST.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2868 2956 SVCHOST.exe 30 PID 2956 wrote to memory of 2868 2956 SVCHOST.exe 30 PID 2956 wrote to memory of 2868 2956 SVCHOST.exe 30 PID 2956 wrote to memory of 2868 2956 SVCHOST.exe 30 PID 1756 wrote to memory of 2536 1756 db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe 31 PID 1756 wrote to memory of 2536 1756 db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe 31 PID 1756 wrote to memory of 2536 1756 db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe 31 PID 1756 wrote to memory of 2536 1756 db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe 31 PID 1756 wrote to memory of 2536 1756 db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe 31 PID 1756 wrote to memory of 2536 1756 db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe 31 PID 1756 wrote to memory of 2536 1756 db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db49b04ed42731bed33b51099e29d26c_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\UNINSTAL.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SVCHOST.exeC:\Windows\SVCHOST.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD5db49b04ed42731bed33b51099e29d26c
SHA16a54575c368a7336cbdac132d35dd8bd30f4ad66
SHA256766f42ef27903a9a3b23b4187c5e90029e4530f7f9e5712c1b2535649358395c
SHA512f29f116812a839bd59814ecf3485f181e9edea7df0f64bfaec18b7b85c6f513205d445bb3c6965d8ba2ec4a3a608d1cd72c341261e9576a92e1b68c39e716453
-
Filesize
214B
MD57b7306b479439457863f0e5a40296650
SHA1b96bc5ad423f006386ca7ef2b3159ba3abb9c5e8
SHA256e352fda1fe7c88e44b396ae1dc6118f999b6936bcef49fafef69a32344ab5a87
SHA512da3f57cde971f200fb6a47a3cadb52f89d0fe91c28039e0e90e889ac0fcfa512deee78280a7019f698bd084d2cfc744f8fcaf7db0e6393755eee1ed1032821d8