Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 00:31
Static task
static1
Behavioral task
behavioral1
Sample
e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe
-
Size
706KB
-
MD5
e1592ecc5789dfe24045e99f767b454e
-
SHA1
fd26e3c78e4900b4b1988d2316ad31c92c2d664a
-
SHA256
699458fb3e81e91a5b7b4b34a758dcfecf62c196b434b93184f6982ae725f29b
-
SHA512
5dd78fdb32cc409c2e4c7d910283e4429a6096b4e3500eeabe2c36ab35484ffa5d90428ff9f044375d220fdc60b81206877a22c553eeac25b466bcb4da16b715
-
SSDEEP
12288:4oC/S1rUvPN+DfXw4l+WZ1I77MoDqF3Z4mxxfHkfZESXP:41S1A+Dfhl31Y7DWQmXfkfL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2992 2.exe 2652 McShield.exe -
Loads dropped DLL 2 IoCs
pid Process 1984 e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe 1984 e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\EYFTWX.DAT 2.exe File created C:\Windows\McShield.exe 2.exe File opened for modification C:\Windows\McShield.exe 2.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language McShield.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2992 2.exe Token: SeDebugPrivilege 2652 McShield.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 McShield.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 McShield.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2992 1984 e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2992 1984 e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2992 1984 e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2992 1984 e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe 30 PID 2652 wrote to memory of 2640 2652 McShield.exe 32 PID 2652 wrote to memory of 2640 2652 McShield.exe 32 PID 2652 wrote to memory of 2640 2652 McShield.exe 32 PID 2652 wrote to memory of 2640 2652 McShield.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1592ecc5789dfe24045e99f767b454e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\McShield.exeC:\Windows\McShield.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD56853cba3ccc11699c2d840f41c10393f
SHA180a430dcc2cb34b05d433f0f63b8ef8a6a09bbe3
SHA2560bcf3f4ff7862cd885003b8ecc4d424a2fd418fd64412ffe95a9c4221cc3de59
SHA512a02fef8b7c721459fa6f081a1208bf8dd84d957663b4d711b9f6f1731deedf977e5a391ec7481797da7a594c3dd133e84865133855dcdbe6da2128887270114c
-
Filesize
799KB
MD564758c8c58296223cdeed48687e460c9
SHA1019734c3bfe0e8c8e20cc06da8579c6e5c4a7b20
SHA25620cab8d661116d1907ea20b228b95a3184196706550070ff14a7806f4d6d702f
SHA5125f64a3a43ca9636378eab47ba77b5cbd3934b9eb00ce40e350dc7c91ba218d935f1c358e899c8677629f2ec19f7c97078544278c9aa43f3ca431912347a179b4