Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 10:37
Static task
static1
Behavioral task
behavioral1
Sample
da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe
-
Size
191KB
-
MD5
da293fbfe127cef0a67607e4113e2276
-
SHA1
38ec2a9b15825f6037fa1f640f41aedacc0da89e
-
SHA256
2751ffc40e29cde0dc8ff2c99bf40ebd191011215be95539d8cb3dcdd38483be
-
SHA512
12d60a2c9051c626efe0c24c97508786afdb6f9f6907721d1bc386f98ee1bbd3d3977b05f381115df98c7c0814bf5be5ce9bc53a3d9360a30f9c08c0f207e6eb
-
SSDEEP
3072:y04gFmx6HgZ6mBsN7foc2GOfAD5In+Y8CQdwvj8C9jtq3Sm3j5n8s2x3Ws0L3amh:ogFmx6Hmcwc2G/9UHtBjg3SOjYWj2aK
Malware Config
Signatures
-
Event Triggered Execution: AppCert DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1212 Explorer.EXE -
Loads dropped DLL 8 IoCs
pid Process 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 3068 rundll32.exe 3068 rundll32.exe 3068 rundll32.exe 3068 rundll32.exe 2696 cmd.exe 2128 attrib.exe 852 Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\getmskey.dll da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe File opened for modification C:\Windows\system32\getmskey64.dll da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3068 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 28 PID 1688 wrote to memory of 3068 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 28 PID 1688 wrote to memory of 3068 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 28 PID 1688 wrote to memory of 3068 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2696 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2696 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2696 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2696 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2696 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2696 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 29 PID 1688 wrote to memory of 2696 1688 da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1212 3068 rundll32.exe 21 PID 3068 wrote to memory of 1212 3068 rundll32.exe 21 PID 2696 wrote to memory of 2128 2696 cmd.exe 31 PID 2696 wrote to memory of 2128 2696 cmd.exe 31 PID 2696 wrote to memory of 2128 2696 cmd.exe 31 PID 2696 wrote to memory of 2128 2696 cmd.exe 31 PID 2696 wrote to memory of 2128 2696 cmd.exe 31 PID 2696 wrote to memory of 2128 2696 cmd.exe 31 PID 2696 wrote to memory of 2128 2696 cmd.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2128 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\getmskey64.dll",CreateProcessNotify3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259435278.bat" "C:\Users\Admin\AppData\Local\Temp\da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe""3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h"C:\Users\Admin\AppData\Local\Temp\da293fbfe127cef0a67607e4113e2276_JaffaCakes118.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2128
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75B
MD55027450887d9ba84e74a9594d7250c54
SHA195ed4b37d75cc2db22514a1046ff9f04c66cd0eb
SHA25643aa98cf0b9e5d5de2e5626799e03c7af69a64ba7ea9906b31b0d807b7a2592d
SHA5120c915d8bc1be976281033cfc53abced4d567ccdcfc471642bab24a5c336046166bda823c7e4f83727aeaa180fce6f15ac37abb8acc358587a46856c34741bc8b
-
Filesize
55KB
MD58d5add4097a742837ec101015cf23354
SHA1386c2c3994f64551dbef069a78220e4968105105
SHA256b561ff6cb2623dfe6a376236d1aeac0f0111a4e6abe4eee18f6cf04c08f8c5eb
SHA51231302754f99f6101518633e7566d05b14ef9c4d88233ce11c19e1bb92cfaba2e172d4cd835eabc687ba6bbd1f45702de8c782fbd84e1f2451a3a09de6d1a510f
-
Filesize
61KB
MD5cde6aca8ce75c23e287b04f634cb652a
SHA16320d03cd7124cd98d81bf9f10812db1689b9843
SHA2565914e26e3b3fc5f58680b50af6cbf566780517ae6c81aac864380eda6f83149f
SHA512aca6895f9e0072370ff63d0bfadd819db4e1f3b52ad59053036fdddd460ef324256631030c8b18e541847e236b52be2041c131c80f8fc3a1dae6c5c4e87f40c2