Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe
-
Size
535KB
-
MD5
dacc42606be5f92b63f95f9188d3697f
-
SHA1
ff3f0d7a66a230e074ff52fdd4dd99180b0d3097
-
SHA256
70f6bb0eeb4d41ec476f347e8e04edab4324474090d47d9d45aae4e0a5229ce8
-
SHA512
93ad578c6e73b3fcc8ac93956e82e95eb48970b3444b349e31fb9c5aa11ccb452b358aafc81bbf84e7a4ea540fbef1b9553c02f95079aaa3432a944a6979d07b
-
SSDEEP
12288:kJugnPrXUVsf1Rrx9BGahHdytAwypp2nlTvcV:k8cPrIsf15hGydBwyppolT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5076 tip.gif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5076 set thread context of 3272 5076 tip.gif 88 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\web\printers\images\tip.gif dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe File opened for modification C:\Windows\web\printers\images\tip.gif dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tip.gif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4608 wrote to memory of 4356 4608 dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe 87 PID 4608 wrote to memory of 4356 4608 dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe 87 PID 4608 wrote to memory of 4356 4608 dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe 87 PID 5076 wrote to memory of 3272 5076 tip.gif 88 PID 5076 wrote to memory of 3272 5076 tip.gif 88 PID 5076 wrote to memory of 3272 5076 tip.gif 88 PID 5076 wrote to memory of 3272 5076 tip.gif 88 PID 5076 wrote to memory of 3272 5076 tip.gif 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dacc42606be5f92b63f95f9188d3697f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\RFPAFW.bat2⤵
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Windows\web\printers\images\tip.gifC:\Windows\web\printers\images\tip.gif1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" 555482⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD508fc31291160be5764d55ddf5159b0e1
SHA1fc69e180c06cc76e7aa16445b99a238bd932fcc8
SHA2565e8b0245c0170076ff96e3e491a92859a2ecb5bd6b7728d55de7bc4094e0eff8
SHA512bc780b05fee135cce23c4c3a2887cd01005000b052165e3a7cf69f98f82b3eb30b27d2ed028cfcf65ea57e2d78ba53b437f0792ac0bf211b8c7becac759f1ead
-
Filesize
535KB
MD5dacc42606be5f92b63f95f9188d3697f
SHA1ff3f0d7a66a230e074ff52fdd4dd99180b0d3097
SHA25670f6bb0eeb4d41ec476f347e8e04edab4324474090d47d9d45aae4e0a5229ce8
SHA51293ad578c6e73b3fcc8ac93956e82e95eb48970b3444b349e31fb9c5aa11ccb452b358aafc81bbf84e7a4ea540fbef1b9553c02f95079aaa3432a944a6979d07b