Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 00:30
Behavioral task
behavioral1
Sample
e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe
-
Size
26KB
-
MD5
e158974c1f8332b8949bfcfbac795c4a
-
SHA1
e374293cdc58a930cd35d763fe79dad1c34828fd
-
SHA256
5ede3c9d934508b44e347309e450a4e76b2ccb1f4c23d1ea9e045c2cc5e9f5ea
-
SHA512
ac5b714f449f384e7a661e5361cae6a56cbb7577212fc3532ccb1ec4e5171eb945a176a0c62e8fa8e27fe63336165e5f510253598a3c155db2e973507e107e17
-
SSDEEP
384:EjFWQSKKBGXKsO2eW1Ab8En0g6OVSQdNu55xao0yPnE8n6/mFeklzp+DWlWYS:E7SKKWw2eWdD7Ofi/PE8n64lzcK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5020-0-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/5020-7-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1460 sc.exe 3924 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5020 wrote to memory of 644 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 86 PID 5020 wrote to memory of 644 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 86 PID 5020 wrote to memory of 644 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 86 PID 644 wrote to memory of 1776 644 net.exe 88 PID 644 wrote to memory of 1776 644 net.exe 88 PID 644 wrote to memory of 1776 644 net.exe 88 PID 5020 wrote to memory of 2088 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 89 PID 5020 wrote to memory of 2088 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 89 PID 5020 wrote to memory of 2088 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 89 PID 2088 wrote to memory of 4556 2088 net.exe 91 PID 2088 wrote to memory of 4556 2088 net.exe 91 PID 2088 wrote to memory of 4556 2088 net.exe 91 PID 5020 wrote to memory of 1460 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 92 PID 5020 wrote to memory of 1460 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 92 PID 5020 wrote to memory of 1460 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 92 PID 5020 wrote to memory of 3924 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 93 PID 5020 wrote to memory of 3924 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 93 PID 5020 wrote to memory of 3924 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 93 PID 5020 wrote to memory of 1708 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 100 PID 5020 wrote to memory of 1708 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 100 PID 5020 wrote to memory of 1708 5020 e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\net.exenet stop wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:1776
-
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
PID:4556
-
-
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Windows\SysWOW64\sc.exesc delete sharedaccess2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.bat C:\Users\Admin\AppData\Local\Temp\e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e158974c1f8332b8949bfcfbac795c4a_JaffaCakes118.bat2⤵
- System Location Discovery: System Language Discovery
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD5e3b0a4ae48f7cfe95b51f8d3cfd329d0
SHA116d9435d895dcf1680baf5b8ebc6342f561af049
SHA25690423a49e145f44c6cefc80ba4351d04a4eaaee2b86e38aad1d9927fbad3d7bf
SHA5125abd674b6e8896bedacd7e0ae593d49771f5c5a036adab1963a37e38f5f2cf185b157d101e97c6e1572b5ae4dfcbfa0470871b2faa0a8d96c6dae19b1329b9f3