Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe
-
Size
384KB
-
MD5
dba73d9c46468248ce2b68fd6728105b
-
SHA1
d36fe7fc292be06a246c388a88794e7b506aa6d2
-
SHA256
ea268087d17a39c87f41ca023fbcd14e44373c4158eaec9e5d755ebb9cf0171e
-
SHA512
843a9246bf16c1eb8621ddba50921b6b4aaf95c799632db2edf6b53172521e66c4d3d3458ff5abfd9db5a5cd3ff6251897292bc8d1d4e56032f2bfc146c096da
-
SSDEEP
6144:y1Ej8iDF2wvJF4s2Jm3H8AXqMxI3DnbBkxjiv03ZOPEzzb2Y2dec:Bjj7MJGMDnbatNO8zzbmec
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 2436 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4308-2-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/4308-4-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/4308-5-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/4308-7-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/4308-6-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/4308-8-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/4308-19-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/2436-27-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/2436-28-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/2436-29-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/2436-34-0x0000000000400000-0x00000000004CC000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe File created C:\Windows\SysWOW64\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe File created C:\Windows\SysWOW64\stsf1.bat dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe File created C:\Windows\SysWOW64\stsf.bat dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2976 set thread context of 4308 2976 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 85 PID 4852 set thread context of 2436 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2976 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 4308 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 4308 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 4308 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 2436 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 2436 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 2436 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2976 wrote to memory of 4308 2976 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 85 PID 2976 wrote to memory of 4308 2976 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 85 PID 2976 wrote to memory of 4308 2976 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 85 PID 2976 wrote to memory of 4308 2976 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 85 PID 2976 wrote to memory of 4308 2976 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 85 PID 2976 wrote to memory of 4308 2976 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 85 PID 2976 wrote to memory of 4308 2976 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 85 PID 2976 wrote to memory of 4308 2976 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 85 PID 4308 wrote to memory of 924 4308 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 87 PID 4308 wrote to memory of 924 4308 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 87 PID 4308 wrote to memory of 924 4308 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 87 PID 4308 wrote to memory of 1448 4308 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 88 PID 4308 wrote to memory of 1448 4308 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 88 PID 4308 wrote to memory of 1448 4308 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 88 PID 924 wrote to memory of 4852 924 cmd.exe 91 PID 924 wrote to memory of 4852 924 cmd.exe 91 PID 924 wrote to memory of 4852 924 cmd.exe 91 PID 4852 wrote to memory of 2436 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 92 PID 4852 wrote to memory of 2436 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 92 PID 4852 wrote to memory of 2436 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 92 PID 4852 wrote to memory of 2436 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 92 PID 4852 wrote to memory of 2436 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 92 PID 4852 wrote to memory of 2436 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 92 PID 4852 wrote to memory of 2436 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 92 PID 4852 wrote to memory of 2436 4852 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 92 PID 2436 wrote to memory of 892 2436 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 93 PID 2436 wrote to memory of 892 2436 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 93 PID 2436 wrote to memory of 892 2436 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 93 PID 2436 wrote to memory of 5084 2436 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 94 PID 2436 wrote to memory of 5084 2436 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 94 PID 2436 wrote to memory of 5084 2436 dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\stsf1.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exedba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exeC:\Windows\SysWOW64\dba73d9c46468248ce2b68fd6728105b_JaffaCakes118.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\stsf1.bat6⤵
- System Location Discovery: System Language Discovery
PID:892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\stsf.bat6⤵
- System Location Discovery: System Language Discovery
PID:5084
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\stsf.bat3⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD507425730c227db6340ad62dd7f1072ff
SHA1a624b7f61d317666e6d22ccfce0b73d28c3a6c73
SHA2569b1179386a91f26967b9a6d12ef76c58a251edc352ea421d5c023bdfe03db358
SHA512fde605a4eb48bf5e1d446cb0c879d8ec20f9f1cfe3b8fd2251cd9583c6de49230286182419509cd97344072f9ef8d59a5297e3c7c8b5e55c2ddb8be1b083d04e
-
Filesize
178B
MD542f7d131b1ae5c69d2d6e1730995cabf
SHA18d2bacd8f56646a8de77c52c6e03b35032f337bb
SHA256ef16b01e6462c9f9f546f74f8397a0419afbcc8fb8e2b147b456b7e9156284c2
SHA5128d8a3110847b01945817935c0b55e842f141898c38e405bc358acceb6630acdddacd744b917cd24c4e60253fa2df58690c2d1d0c11e7d492215046993d26c130
-
Filesize
384KB
MD5dba73d9c46468248ce2b68fd6728105b
SHA1d36fe7fc292be06a246c388a88794e7b506aa6d2
SHA256ea268087d17a39c87f41ca023fbcd14e44373c4158eaec9e5d755ebb9cf0171e
SHA512843a9246bf16c1eb8621ddba50921b6b4aaf95c799632db2edf6b53172521e66c4d3d3458ff5abfd9db5a5cd3ff6251897292bc8d1d4e56032f2bfc146c096da