Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 20:29
Behavioral task
behavioral1
Sample
ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe
-
Size
6.1MB
-
MD5
ded897f1b9fea4102bccc21c30fcc797
-
SHA1
94d0f6d39740bf618173e388f739d8625c7e4eb2
-
SHA256
59d77dea7a15139fe6aaaa6a3a16dd315ba7bb8a20153a3d9c5f65d0b9aa7c34
-
SHA512
a7b3f2f315170117ed529919fd5a3fd4fa494ff7ce571dd4a68ac682e6b8cc69723b65e00afd89c9d9411e5345e0e531769dfc9a966ad0e3e2848b0b57947114
-
SSDEEP
98304:oAwzZHd5CU4G9KwYAOujNkIIp/sPuYvko1dup0Wy2k1bRNQLhA4OolahKAHW7rYg:2Zh4GkrAOuqnpEPxvkTb+A9akAHiEg
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1580-0-0x0000000000F00000-0x0000000001ED9000-memory.dmp upx behavioral1/memory/1580-27-0x0000000000F00000-0x0000000001ED9000-memory.dmp upx behavioral1/memory/1580-28-0x0000000000F00000-0x0000000001ED9000-memory.dmp upx behavioral1/memory/1652-29-0x0000000000F00000-0x0000000001ED9000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\Count ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1580 set thread context of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1652 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 1652 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 1652 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 1652 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 1652 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 1652 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ded897f1b9fea4102bccc21c30fcc797_JaffaCakes118.exe"2⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1652
-