Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 02:54
Behavioral task
behavioral1
Sample
df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe
-
Size
319KB
-
MD5
df5bfa7a94f2fc635a25c554b7b1a09c
-
SHA1
2a83e5d56dd8312275df479fdf4cf663c116f5ef
-
SHA256
be4263abedfaaa3ddf5a42df10f5e74abe545a9c5e4ebbf7572b34e76f594824
-
SHA512
afb236a89bcf38f58ee670c7f670a7252abf3e2491682acd43a5f84826dae14fed243d8d974ef1a18f5da2ae9e077074a7c9cd890f80089ce292b222851bba5e
-
SSDEEP
6144:uMC0piyHhoYmipPq3dzlTYjUZNogL9Smn4oTT0IIXnCIarq//Gy8hDW6uVdxzlBv:uMBphhNxelTYjUZrshosIUCIaqL8hD2H
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Aeuhxp = "C:\\Windows\\SysWOW64\\odbc32W.exe" df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts odbc32W.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2096 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2236 odbc32W.exe -
Loads dropped DLL 2 IoCs
pid Process 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1964-1-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/1964-0-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/1964-7-0x0000000000400000-0x00000000004BF000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\odbc32W.exe df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\odbc32W.exe df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odbc32W.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2768 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2236 odbc32W.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2236 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2236 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2236 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2236 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2768 2236 odbc32W.exe 33 PID 2236 wrote to memory of 2768 2236 odbc32W.exe 33 PID 2236 wrote to memory of 2768 2236 odbc32W.exe 33 PID 2236 wrote to memory of 2768 2236 odbc32W.exe 33 PID 1964 wrote to memory of 2096 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe 35 PID 1964 wrote to memory of 2096 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe 35 PID 1964 wrote to memory of 2096 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe 35 PID 1964 wrote to memory of 2096 1964 df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\odbc32W.exeC:\Windows\SysWOW64\odbc32W.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exe/c C:\Users\Admin\AppData\Local\Temp\~unins8258.bat "C:\Users\Admin\AppData\Local\Temp\df5bfa7a94f2fc635a25c554b7b1a09c_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49B
MD59e0a2f5ab30517809b95a1ff1dd98c53
SHA15c1eefdf10e67d1e9216e2e3f5e92352d583c9ce
SHA25697ac9fee75a1f7b63b3115e9c4fb9dda80b1caba26d2fb51325670dee261fe32
SHA512e959cc1fd48fb1cccf135a697924c775a3812bab211fc7f9b00c5a9d617261d84c5d6f7cb548774c1e8f46811b06ca39c5603d0e10cbcb7b805f9abbe49b9b42
-
Filesize
128KB
MD55870225d32ff2c7792b4de7dfa2daf04
SHA132c72a49d22cd0fb55c60ae4691b823793dbf19a
SHA2569a649eb0792185a1783b2c3df168ce687a02406a2500f7f74b7ee7dbe8f4f215
SHA512d208e9d3bec7a9a1b6e59334ccf5bcbee0dd1563b2efc8549bb374b886e9d615c0dd88fe7b726d5f0292e6ccb63f19d24dee2d53b80adce6102acdb55fbdc3af