Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 23:31
Static task
static1
Behavioral task
behavioral1
Sample
e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe
-
Size
344KB
-
MD5
e39631fe80afbb62dab1b3c7302f8dba
-
SHA1
a018136af1c0f58633e759b78417b134d1e86725
-
SHA256
a9ff9a41326c279855caea185b0582337a3fa43141fa0438e14517012f42485a
-
SHA512
4c23d042c36237e0f561c9588de3484c146f39ea03adcad59f5b144165e513798c3604e43d09ac8251da078ba39d68c065d16056b8d72dd2a88a49e22f65b783
-
SSDEEP
3072:niyYjwU6pDpp6c/DPZauWGo8LqZArxcjXAvZ4TokBsAmec7GAC////////zhHM:lY6Uc7g8LdtYCs/1Zc7G3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1648 Rem5.exe -
Loads dropped DLL 2 IoCs
pid Process 2300 cmd.exe 2300 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\LKJhgtYGS = "\"C:\\Users\\Admin\\AppData\\Roaming\\Rem5\\Rem5.exe\"" Rem5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\LKJhgtYGS = "\"C:\\Users\\Admin\\AppData\\Roaming\\Rem5\\Rem5.exe\"" e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1648 set thread context of 1148 1648 Rem5.exe 35 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\win.ini svchost.exe File opened for modification C:\Windows\win.ini e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe File opened for modification C:\Windows\win.ini Rem5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rem5.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2256 e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe 1648 Rem5.exe 1648 Rem5.exe 1148 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2444 2256 e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2444 2256 e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2444 2256 e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2444 2256 e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2300 2444 WScript.exe 32 PID 2444 wrote to memory of 2300 2444 WScript.exe 32 PID 2444 wrote to memory of 2300 2444 WScript.exe 32 PID 2444 wrote to memory of 2300 2444 WScript.exe 32 PID 2300 wrote to memory of 1648 2300 cmd.exe 34 PID 2300 wrote to memory of 1648 2300 cmd.exe 34 PID 2300 wrote to memory of 1648 2300 cmd.exe 34 PID 2300 wrote to memory of 1648 2300 cmd.exe 34 PID 1648 wrote to memory of 1148 1648 Rem5.exe 35 PID 1648 wrote to memory of 1148 1648 Rem5.exe 35 PID 1648 wrote to memory of 1148 1648 Rem5.exe 35 PID 1648 wrote to memory of 1148 1648 Rem5.exe 35 PID 1648 wrote to memory of 1148 1648 Rem5.exe 35 PID 1648 wrote to memory of 1148 1648 Rem5.exe 35 PID 1648 wrote to memory of 1148 1648 Rem5.exe 35 PID 1648 wrote to memory of 1148 1648 Rem5.exe 35 PID 1648 wrote to memory of 1148 1648 Rem5.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e39631fe80afbb62dab1b3c7302f8dba_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Rem5\Rem5.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Roaming\Rem5\Rem5.exeC:\Users\Admin\AppData\Roaming\Rem5\Rem5.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410B
MD54b309959125fb954b68968bad5bed9ac
SHA1b2b805fa81f1b82fa07b718031c9a89046731146
SHA256109742373d7cca30b46ef4b05d9b86694e2a54f862afd891e7bba50cf0f18830
SHA5129d90d6f5085ac7103aee6679272b677589afe3a50835152f3c1f799080e38b975f3c246d6649926a80a7ee3bbcabf755d6a20cf768083714a359bc9a5af9cf92
-
Filesize
79B
MD5da55226bfacef064a1e23a5f5f084fdd
SHA14a10dc841b56738de2afd94121a606429f6f46db
SHA2560026af16d0c0385de81f81ee0e1f30e862fef183df97d42f78ffb42b12e5c656
SHA5122365b75bfe7e60ebe09e4b8f3f3cf53c19b2eb984dc4e508bbd2258175e7ab79c4f0dea8d70ee1c568acab7a36e00b13fa4f0fd3ecf6e1e2c88d6119b7b55c59
-
Filesize
506B
MD58e6100faa270f8b935ebba91ae814491
SHA11b5d16ec7d3f2ed289fc4c079fed992275578257
SHA256293b109535400cdd3eb36c8a47dcdda245e8f48200aa59bfddb21d105923e93b
SHA51278b36ef3fd77d991d7ef9aa4f900f653edb1df5ab6ddbc369e0b3b3430fba9074673bf67d208cbb885b41afd3a9cd26ae9c2b392c70df7d08f055a41318469e7
-
Filesize
344KB
MD5e39631fe80afbb62dab1b3c7302f8dba
SHA1a018136af1c0f58633e759b78417b134d1e86725
SHA256a9ff9a41326c279855caea185b0582337a3fa43141fa0438e14517012f42485a
SHA5124c23d042c36237e0f561c9588de3484c146f39ea03adcad59f5b144165e513798c3604e43d09ac8251da078ba39d68c065d16056b8d72dd2a88a49e22f65b783