Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 16:47
Static task
static1
Behavioral task
behavioral1
Sample
de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe
-
Size
151KB
-
MD5
de823ba5d67de8682e6d7b8b472dbbcb
-
SHA1
5a6c8a94f16906bfce04a892b40aaa5470fdaeb6
-
SHA256
b5e5a10f1938311fb83b7c8a9ad59977e12734f4f61361afa83dd49d6ca377d3
-
SHA512
5659e3c4d7e3af18cf06f3c0a05272deef6b169be2b3c2979f7ab69fc90120877d3e52b508a8e24949e6622e428fc82396a42fb30ec7d5ff0bc8733d034649de
-
SSDEEP
3072:6OfDkDkZ8w0HS4FjEoVrS3VOqiRrXbvJOykW1Ly4d:f7voBFIZIbvJOmLy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 explorer.exe -
Executes dropped EXE 5 IoCs
pid Process 2816 explorer.exe 2688 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2920 sqlserver.exe -
Loads dropped DLL 7 IoCs
pid Process 2660 de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe 2660 de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe 2816 explorer.exe 2816 explorer.exe 2832 igfpers.exe 2832 igfpers.exe 2908 sqlserver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\NVIDIA User Experience Driver Component = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\igfpers.exe" igfpers.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2816 set thread context of 2688 2816 explorer.exe 31 PID 2908 set thread context of 2920 2908 sqlserver.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqlserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfpers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqlserver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe 2832 igfpers.exe 2908 sqlserver.exe 2816 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2660 de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe Token: SeDebugPrivilege 2816 explorer.exe Token: SeDebugPrivilege 2832 igfpers.exe Token: SeDebugPrivilege 2908 sqlserver.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2816 2660 de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2816 2660 de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2816 2660 de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2816 2660 de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe 30 PID 2816 wrote to memory of 2688 2816 explorer.exe 31 PID 2816 wrote to memory of 2688 2816 explorer.exe 31 PID 2816 wrote to memory of 2688 2816 explorer.exe 31 PID 2816 wrote to memory of 2688 2816 explorer.exe 31 PID 2816 wrote to memory of 2688 2816 explorer.exe 31 PID 2816 wrote to memory of 2688 2816 explorer.exe 31 PID 2816 wrote to memory of 2688 2816 explorer.exe 31 PID 2816 wrote to memory of 2688 2816 explorer.exe 31 PID 2816 wrote to memory of 2688 2816 explorer.exe 31 PID 2816 wrote to memory of 2688 2816 explorer.exe 31 PID 2816 wrote to memory of 2832 2816 explorer.exe 32 PID 2816 wrote to memory of 2832 2816 explorer.exe 32 PID 2816 wrote to memory of 2832 2816 explorer.exe 32 PID 2816 wrote to memory of 2832 2816 explorer.exe 32 PID 2832 wrote to memory of 2908 2832 igfpers.exe 33 PID 2832 wrote to memory of 2908 2832 igfpers.exe 33 PID 2832 wrote to memory of 2908 2832 igfpers.exe 33 PID 2832 wrote to memory of 2908 2832 igfpers.exe 33 PID 2908 wrote to memory of 2920 2908 sqlserver.exe 34 PID 2908 wrote to memory of 2920 2908 sqlserver.exe 34 PID 2908 wrote to memory of 2920 2908 sqlserver.exe 34 PID 2908 wrote to memory of 2920 2908 sqlserver.exe 34 PID 2908 wrote to memory of 2920 2908 sqlserver.exe 34 PID 2908 wrote to memory of 2920 2908 sqlserver.exe 34 PID 2908 wrote to memory of 2920 2908 sqlserver.exe 34 PID 2908 wrote to memory of 2920 2908 sqlserver.exe 34 PID 2908 wrote to memory of 2920 2908 sqlserver.exe 34 PID 2908 wrote to memory of 2920 2908 sqlserver.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de823ba5d67de8682e6d7b8b472dbbcb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\System\igfpers.exe"C:\Users\Admin\AppData\Local\Temp\System\igfpers.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\System\sqlserver.exe"C:\Users\Admin\AppData\Local\Temp\System\sqlserver.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\System\sqlserver.exeC:\Users\Admin\AppData\Local\Temp\System\sqlserver.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5ea846671907529a26e8abc1c0d21a0db
SHA1d1806ffc2a76ae376be4bf50a4f47f7be50236b4
SHA256abd0678a8c14916abffb49ced1ad71f05b4c1b81e74d36a8c59f7732ccf66a86
SHA512a63eb92717db5153755b6c4682d03ca10b27c29e1ba98b7b70b0bea099a7d5d153c0c940ea9465aa2c9c497a43ea550947723a36d86ae07d87dc0f86cb793af9
-
Filesize
36KB
MD53947d1ec4b3921ee45dc615cdb41289a
SHA1050df6cda2476da1f7f1594985b6add5ccf51d02
SHA256c1facc2d77e87d8210e74029e639b05dd7482aa2b1eb2e7cc7699ec45aa96b71
SHA51203313943fe821fbf5b099a9fa329f9f2fce8489bb48084c40ac852fa20e9d685aeaad26888e88791f66f477ac04dc0db318344eed7c81b7062cddb2f497bc333
-
Filesize
151KB
MD5de823ba5d67de8682e6d7b8b472dbbcb
SHA15a6c8a94f16906bfce04a892b40aaa5470fdaeb6
SHA256b5e5a10f1938311fb83b7c8a9ad59977e12734f4f61361afa83dd49d6ca377d3
SHA5125659e3c4d7e3af18cf06f3c0a05272deef6b169be2b3c2979f7ab69fc90120877d3e52b508a8e24949e6622e428fc82396a42fb30ec7d5ff0bc8733d034649de