Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 20:01
Behavioral task
behavioral1
Sample
dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe
-
Size
16KB
-
MD5
dece8e327ece0f240afdbcef1456345b
-
SHA1
0e6c07f684c83120d150c1a72fb46a71b0f90e55
-
SHA256
86c989534785cd8af2b858d14d551784abf32a1f91ad9b9fbf43da67f7329ca5
-
SHA512
06fea16c324e13d22daeb3c270bb16d0dfe9392c5fd1d819e259f466530030c09e2fe31ac1087a012fd1b4b315d4dfbb34bd453ebd3594830308f17ec61c59e6
-
SSDEEP
384:j7Ho1zZtx6RxPQNZ8uPClPMHGdRyfl+CN72mTH3Q4:cdtuHTYGdRyfQk71TXR
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Drivers\beep.sys dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2552 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 MyLoverMain.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe -
resource yara_rule behavioral1/memory/1976-0-0x0000000000160000-0x000000000016B000-memory.dmp upx behavioral1/memory/1976-13-0x0000000000160000-0x000000000016B000-memory.dmp upx behavioral1/files/0x00070000000169f5-14.dat upx behavioral1/memory/2712-15-0x0000000000160000-0x000000000016B000-memory.dmp upx behavioral1/memory/2712-30-0x0000000000160000-0x000000000016B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\me.bat attrib.exe File created C:\Windows\SysWOW64\me.bat dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\MyLover\kaka.bat dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe File created C:\Windows\MyLover\MyLoverDll.dat MyLoverMain.exe File opened for modification C:\Windows\MyLover\MyLoverSYS.dat MyLoverMain.exe File opened for modification C:\Windows\MyLover\MyLoverDll.dat MyLoverMain.exe File created C:\Windows\MyLover\MyLoverDll.dat dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe File created C:\Windows\MyLover\MyLoverSYS.dat dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe File opened for modification C:\Windows\MyLover\MyLoverDll.dat dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe File opened for modification C:\Windows\MyLover\MyLoverSYS.dat dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MyLoverMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 2712 MyLoverMain.exe 2712 MyLoverMain.exe 2712 MyLoverMain.exe 2712 MyLoverMain.exe 2712 MyLoverMain.exe 2712 MyLoverMain.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe Token: SeDebugPrivilege 2712 MyLoverMain.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2636 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 30 PID 1976 wrote to memory of 2636 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 30 PID 1976 wrote to memory of 2636 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 30 PID 1976 wrote to memory of 2636 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2776 2636 NET.exe 32 PID 2636 wrote to memory of 2776 2636 NET.exe 32 PID 2636 wrote to memory of 2776 2636 NET.exe 32 PID 2636 wrote to memory of 2776 2636 NET.exe 32 PID 1976 wrote to memory of 2884 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 33 PID 1976 wrote to memory of 2884 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 33 PID 1976 wrote to memory of 2884 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 33 PID 1976 wrote to memory of 2884 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 33 PID 2884 wrote to memory of 2880 2884 NET.exe 35 PID 2884 wrote to memory of 2880 2884 NET.exe 35 PID 2884 wrote to memory of 2880 2884 NET.exe 35 PID 2884 wrote to memory of 2880 2884 NET.exe 35 PID 2712 wrote to memory of 592 2712 MyLoverMain.exe 9 PID 1976 wrote to memory of 2552 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 37 PID 1976 wrote to memory of 2552 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 37 PID 1976 wrote to memory of 2552 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 37 PID 1976 wrote to memory of 2552 1976 dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe 37 PID 2552 wrote to memory of 2952 2552 cmd.exe 39 PID 2552 wrote to memory of 2952 2552 cmd.exe 39 PID 2552 wrote to memory of 2952 2552 cmd.exe 39 PID 2552 wrote to memory of 2952 2552 cmd.exe 39 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2952 attrib.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dece8e327ece0f240afdbcef1456345b_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\NET.exeNET STOP Beep2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP Beep3⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
C:\Windows\SysWOW64\NET.exeNET START Beep2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 START Beep3⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\me.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a C:\Windows\system32\me.bat3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2952
-
-
-
C:\Windows\MyLover\MyLoverMain.exeC:\Windows\MyLover\MyLoverMain.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5dece8e327ece0f240afdbcef1456345b
SHA10e6c07f684c83120d150c1a72fb46a71b0f90e55
SHA25686c989534785cd8af2b858d14d551784abf32a1f91ad9b9fbf43da67f7329ca5
SHA51206fea16c324e13d22daeb3c270bb16d0dfe9392c5fd1d819e259f466530030c09e2fe31ac1087a012fd1b4b315d4dfbb34bd453ebd3594830308f17ec61c59e6
-
Filesize
4KB
MD53bbf4bbec9e7720a9a53c8911dfa3aab
SHA1f50695daf4f0b366b12e9c065519295d03cf6d3f
SHA256c0bed2920e25a28af51029d5deaafff82d0955f8bd8e7ea21d2bdbd3e177c7c0
SHA512b9263452daa0247d8c9f75cdc1b837a56d526804d9c559e2790c78371307f9e3d0ec9a584d8463acd02d57ce75f523e3c2e4dab2a4d4e2ed0e0ddd22d335fb36
-
Filesize
151B
MD5af1819d02253eb07879565c52c99b6b0
SHA168ad70fba4ba1ad46e135f2a157e915b5ee9baa2
SHA256ec7e9f0327a1f9d949038f1a129a0228ea5fb652e7247df0fef9ea1234fb735c
SHA512979b31ac7297a6dacdb6d6fe1de0794a3647b7f96214b0fc66365b42d33b1fabc9f3395ed32527c68de44dc54fdaacbfd983dc6077391201cb868efa0b947c1c
-
Filesize
11KB
MD5f502f7533e37157b70d6871ef93bc65d
SHA1a2b7b7cefa310c41018371147ba64c2deb53e0c3
SHA25655c96bbe5490b47a82b7dda9dd751c137fec4aa39dbd5ec01c29c5ca1685019c
SHA512272872e7022cfba8448a0cbaef5473db3d949c2eeff0521c870045190f12f8641b37bae26170916eb117887f15f4c169fc0e1c7443e1a58db6203fb44a3bc24a