Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe
-
Size
148KB
-
MD5
e118afcee9d7d6fc2286a46ae784cdb6
-
SHA1
d7d1432f7b4e7ff0ec8f3a4b18e968054f9bbf11
-
SHA256
c5e37d9b6d96c387a8196f6a3f03d60372ea2a1f247aa7ed3256cef16c04397d
-
SHA512
aefe1d15b4f71af2d450af6fb549c6e798cca2b0a15c302e728b5fa886540c64af2f2c624ef44af6bb40744f8b65c60905bf90c6a4eab58539fec94de1159fbb
-
SSDEEP
3072:dTjA3sf/Ke54gZJWBW6mPVntTBfv8wTjF:dEhm6qVntTBMwP
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\msacm32.drv e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1964 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2572 wrote to memory of 1964 2572 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 31 PID 2572 wrote to memory of 1964 2572 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 31 PID 2572 wrote to memory of 1964 2572 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 31 PID 2572 wrote to memory of 1964 2572 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 31 PID 1964 wrote to memory of 1376 1964 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 32 PID 1964 wrote to memory of 1376 1964 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 32 PID 1964 wrote to memory of 1376 1964 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 32 PID 1964 wrote to memory of 1376 1964 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 32 PID 1964 wrote to memory of 1988 1964 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 34 PID 1964 wrote to memory of 1988 1964 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 34 PID 1964 wrote to memory of 1988 1964 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 34 PID 1964 wrote to memory of 1988 1964 e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe 34 PID 1688 wrote to memory of 2852 1688 explorer.exe 36 PID 1688 wrote to memory of 2852 1688 explorer.exe 36 PID 1688 wrote to memory of 2852 1688 explorer.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e118afcee9d7d6fc2286a46ae784cdb6_JaffaCakes118.exe2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd.exe3⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:1988
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵PID:2852
-