Analysis
-
max time kernel
97s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe
-
Size
356KB
-
MD5
dc554d6343a952e5f269ab6fe983447d
-
SHA1
fa765406fe4e041de54f9414936875151c1f35f7
-
SHA256
6fe72dc7e0a3ec67205bf8ec520724bd99411d0c1122d6fb1ae94706a162d0cd
-
SHA512
b997ad381856897d7e31a82c3a781a20307c998ae66cc38cee30999c3460173175f13107fe9304fbfe2b1d9122ca522a41b07f55fd423b88780cdc058992c0fa
-
SSDEEP
6144:7vbx8gUHPq+m6d002UoNlGxSSrJGUOcUURynzqiIKpe:7dUHyj6WjblASeBOyRynt0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2788 1Y1tfl7s5.exe -
Executes dropped EXE 2 IoCs
pid Process 3340 1Y1tfl7s5.exe 2788 1Y1tfl7s5.exe -
Loads dropped DLL 4 IoCs
pid Process 1820 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 1820 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 2788 1Y1tfl7s5.exe 2788 1Y1tfl7s5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xu2bukODkTXm = "C:\\ProgramData\\yGeJbAr47\\1Y1tfl7s5.exe" dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3208 set thread context of 1820 3208 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 86 PID 3340 set thread context of 2788 3340 1Y1tfl7s5.exe 88 PID 2788 set thread context of 1628 2788 1Y1tfl7s5.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Y1tfl7s5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Y1tfl7s5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1820 3208 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 86 PID 3208 wrote to memory of 1820 3208 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 86 PID 3208 wrote to memory of 1820 3208 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 86 PID 3208 wrote to memory of 1820 3208 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 86 PID 3208 wrote to memory of 1820 3208 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 86 PID 1820 wrote to memory of 3340 1820 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 87 PID 1820 wrote to memory of 3340 1820 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 87 PID 1820 wrote to memory of 3340 1820 dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe 87 PID 3340 wrote to memory of 2788 3340 1Y1tfl7s5.exe 88 PID 3340 wrote to memory of 2788 3340 1Y1tfl7s5.exe 88 PID 3340 wrote to memory of 2788 3340 1Y1tfl7s5.exe 88 PID 3340 wrote to memory of 2788 3340 1Y1tfl7s5.exe 88 PID 3340 wrote to memory of 2788 3340 1Y1tfl7s5.exe 88 PID 2788 wrote to memory of 1628 2788 1Y1tfl7s5.exe 89 PID 2788 wrote to memory of 1628 2788 1Y1tfl7s5.exe 89 PID 2788 wrote to memory of 1628 2788 1Y1tfl7s5.exe 89 PID 2788 wrote to memory of 1628 2788 1Y1tfl7s5.exe 89 PID 2788 wrote to memory of 1628 2788 1Y1tfl7s5.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\ProgramData\yGeJbAr47\1Y1tfl7s5.exe"C:\ProgramData\yGeJbAr47\1Y1tfl7s5.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\ProgramData\yGeJbAr47\1Y1tfl7s5.exe"C:\ProgramData\yGeJbAr47\1Y1tfl7s5.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" /i:27885⤵PID:1628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD5dc554d6343a952e5f269ab6fe983447d
SHA1fa765406fe4e041de54f9414936875151c1f35f7
SHA2566fe72dc7e0a3ec67205bf8ec520724bd99411d0c1122d6fb1ae94706a162d0cd
SHA512b997ad381856897d7e31a82c3a781a20307c998ae66cc38cee30999c3460173175f13107fe9304fbfe2b1d9122ca522a41b07f55fd423b88780cdc058992c0fa
-
Filesize
356KB
MD5110da21bc3d159a50503a81c26dd8730
SHA10ab6a45656a3f282f30c3d692c8d2010a854d9a4
SHA2565353973f6a622e24f47ac0827e607a3e2e1df8d86ba76f7f4fc57d0abb86540e
SHA512d185997eab001443fac03d69e1d89da208daf80ffd7f3ab7effb50a496f9f76ffaa339c22600765cc7209323e59fad2967ddb931831889dbc1e7dd292907b77a