Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe
-
Size
995KB
-
MD5
e27ac279696dc6b4309fd3efb516d8d6
-
SHA1
84abf4924c5e5ae5fb571dc7b3c90ae890ebfa0d
-
SHA256
364dd59b9d54d3dba476dfae0db524ef2e2a46bca22003b1bfc33f3ab2a3e261
-
SHA512
8dc43cf5b811993b2f3062731dda5e68b5056c95b828acb8ef0e1d423407b22fd0a46e5247f8da6298c21f0a66eebba5fc763e6d777bab41d1132509455a889a
-
SSDEEP
24576:Oj0oe78w/dp3lydjvE6d9LfYr8ucU0B24qJ7l/:Oj0T8w/dpIdj86d1Yr85UW27l/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4420 setup69.exe 3252 install36.exe -
resource yara_rule behavioral2/files/0x00080000000234db-2.dat upx behavioral2/memory/4420-4-0x0000000000400000-0x0000000000584000-memory.dmp upx behavioral2/memory/4420-11-0x0000000000400000-0x0000000000584000-memory.dmp upx behavioral2/files/0x00090000000234db-15.dat upx behavioral2/memory/3252-17-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-18-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-19-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-20-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-21-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-22-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-23-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-24-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-25-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-26-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-27-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-28-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-29-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-30-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-31-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3252-32-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe -
Gathers system information 1 TTPs 5 IoCs
Runs systeminfo.exe.
pid Process 4968 systeminfo.exe 5032 systeminfo.exe 4240 systeminfo.exe 4956 systeminfo.exe 2212 systeminfo.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3252 install36.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5044 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5044 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1928 wrote to memory of 4420 1928 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 85 PID 1928 wrote to memory of 4420 1928 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 85 PID 1928 wrote to memory of 4420 1928 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 85 PID 4420 wrote to memory of 4744 4420 setup69.exe 86 PID 4420 wrote to memory of 4744 4420 setup69.exe 86 PID 4420 wrote to memory of 4744 4420 setup69.exe 86 PID 1928 wrote to memory of 3252 1928 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 89 PID 1928 wrote to memory of 3252 1928 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 89 PID 1928 wrote to memory of 3252 1928 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 89 PID 4744 wrote to memory of 4240 4744 CMD.exe 90 PID 4744 wrote to memory of 4240 4744 CMD.exe 90 PID 4744 wrote to memory of 4240 4744 CMD.exe 90 PID 4744 wrote to memory of 4956 4744 CMD.exe 97 PID 4744 wrote to memory of 4956 4744 CMD.exe 97 PID 4744 wrote to memory of 4956 4744 CMD.exe 97 PID 4744 wrote to memory of 2212 4744 CMD.exe 98 PID 4744 wrote to memory of 2212 4744 CMD.exe 98 PID 4744 wrote to memory of 2212 4744 CMD.exe 98 PID 4744 wrote to memory of 4968 4744 CMD.exe 101 PID 4744 wrote to memory of 4968 4744 CMD.exe 101 PID 4744 wrote to memory of 4968 4744 CMD.exe 101 PID 4744 wrote to memory of 5032 4744 CMD.exe 103 PID 4744 wrote to memory of 5032 4744 CMD.exe 103 PID 4744 wrote to memory of 5032 4744 CMD.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\setup69.exeC:\Users\Admin\AppData\Local\Temp\setup69.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\CMD.exeCMD /C SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && DEL "C:\Users\Admin\AppData\Local\Temp\setup69.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:4240
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:4956
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:2212
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:4968
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:5032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\install36.exeC:\Users\Admin\AppData\Local\Temp\install36.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3252
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x2fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5413d0b81dd8b82c3dde4e5ba487c2ba1
SHA1e295bbcbd497ba08b8e33658a1d8dc48a146252f
SHA25617f2b50de7960d913e8b573d5ecc4ade8a7dfe44cbac09384dc2a721725e3ba3
SHA5122eaba5c7213fad7bbb50753c971d150abb313ff66fb10d78d38cf21555c9bdb65e3afa20f41847120e4ee7919716ca70b511d2e67574e7acf6ffe75f5039e0e7
-
Filesize
730KB
MD5f424e134bc3ffd7bdd5bf9aa8ec1b83f
SHA1800fadf2f2669dfeecbc9c8c1b72c4c52831883f
SHA25621aff37c2a7b05de8daf26e3ec3cecaf6215665800831dea0fbceb2a570774fc
SHA51256cd6da933febaa89019ff3118b7f77ccd3ea1921ea80f002aa8a37c424e33e568add062722e0db1c75607b3a4ce1b21a5927b07ec02f86e8db6d93b0ec77a9b