Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe
-
Size
390KB
-
MD5
d9e31199d6e4f88e49372fa4236e2ccc
-
SHA1
8d5dbe7183ff57ff6d53be40c410c05bac059ffe
-
SHA256
5c956afac33f0d1574d5b19e4c55787d4d4ff3200c7b434a4196e992c92579bc
-
SHA512
0a7af75d6c97c8fed18e7ada577e2ecb0af9e4d8a9d3f9be3267c2fb19ecd3ee0f08f69fcc2cda3e16e675d41db4e0c095c90e55c17b522da3abfabc86aedfd4
-
SSDEEP
6144:U8xqv19iuS4vCmX5TnCWOcw65g0VSys/iNnQiAyMt9/etMhQ5I1x4VrNFItl:+N9i/46M5TtOkgwmQQimVQqejm7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SYSTEM = "C:\\WINDOWS\\system32\\system.exe" regedit.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\system.exe d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\system.exe d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\sys.exe d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.bat d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3068 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2332 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2332 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2332 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2332 2364 d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe 30 PID 2332 wrote to memory of 3068 2332 cmd.exe 32 PID 2332 wrote to memory of 3068 2332 cmd.exe 32 PID 2332 wrote to memory of 3068 2332 cmd.exe 32 PID 2332 wrote to memory of 3068 2332 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9e31199d6e4f88e49372fa4236e2ccc_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\WINDOWS\svchost.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\regedit.exeregedit /s svchost.reg3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD546828f24430ece92015c4df745f81128
SHA19a6eeff598129bb79a7978915d671680926000ee
SHA256c57d73dbcfd8da31961145b1da9eeaf9aa66fec3b5ca5dfdd99408d193056aaf
SHA512366dfad8ef7e6ae8fbee9a3bb9f6ea16911f363a1064e548202f5e4c90548926911e20351727f4b885505b90db3cee95ebb6b7a29d71f9c1e2483b1fcbc198b8
-
Filesize
721B
MD50e4e4dc2a8d527e23f4688190970c96a
SHA188ae07ac7f1b98c6e34ee5edd841b97c4f79be2a
SHA256faab8d63e3c20d19e80f7ebb8260cbae906ed84ac2596c46039d96df33c3e5c5
SHA512bfa73107e13ca0f22015a56a9ca31f4727b5a145dccd9f96b3e92da828dcef2b9c07b2a1322ee27d852f624dc44df71387761c5a8954c7676295878004f79d26