Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe
-
Size
648KB
-
MD5
e7d36392836c350b47e1e485465f2446
-
SHA1
b4cfaca779557d14cbccf09accefaf4ec8cec30e
-
SHA256
e037f166b8e3066f5b8fc2f4dea6cf0d052dde5234b46c81e3d5ecf73dc713c2
-
SHA512
c6f530cbfcf8d145e06c7850b1c51f2dc9efbd893229d12a2fe035be89d3c32979c803f4122f77278aa7d3595f70b99cd3fb867adeaea51fbafbaae7d265a3a1
-
SSDEEP
6144:DHtgbfyyNili9mp2kS4/JfrtkXl5w5R0koDQY1/rIPpGV8eY2M:TtcK+iEJ6RraXfwBoUY1/r8KB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2708 RemD.exe -
Loads dropped DLL 2 IoCs
pid Process 2212 cmd.exe 2212 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\hgfgihdgjyf = "\"C:\\Users\\Admin\\AppData\\Roaming\\RemD\\RemD.exe\"" e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\hgfgihdgjyf = "\"C:\\Users\\Admin\\AppData\\Roaming\\RemD\\RemD.exe\"" RemD.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2708 set thread context of 2900 2708 RemD.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RemD.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2576 e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe 2708 RemD.exe 2708 RemD.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2576 e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe 2708 RemD.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2532 2576 e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe 30 PID 2576 wrote to memory of 2532 2576 e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe 30 PID 2576 wrote to memory of 2532 2576 e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe 30 PID 2576 wrote to memory of 2532 2576 e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2212 2532 WScript.exe 31 PID 2532 wrote to memory of 2212 2532 WScript.exe 31 PID 2532 wrote to memory of 2212 2532 WScript.exe 31 PID 2532 wrote to memory of 2212 2532 WScript.exe 31 PID 2212 wrote to memory of 2708 2212 cmd.exe 33 PID 2212 wrote to memory of 2708 2212 cmd.exe 33 PID 2212 wrote to memory of 2708 2212 cmd.exe 33 PID 2212 wrote to memory of 2708 2212 cmd.exe 33 PID 2708 wrote to memory of 2900 2708 RemD.exe 35 PID 2708 wrote to memory of 2900 2708 RemD.exe 35 PID 2708 wrote to memory of 2900 2708 RemD.exe 35 PID 2708 wrote to memory of 2900 2708 RemD.exe 35 PID 2708 wrote to memory of 2900 2708 RemD.exe 35 PID 2708 wrote to memory of 2900 2708 RemD.exe 35 PID 2708 wrote to memory of 2900 2708 RemD.exe 35 PID 2708 wrote to memory of 2900 2708 RemD.exe 35 PID 2708 wrote to memory of 2900 2708 RemD.exe 35 PID 2708 wrote to memory of 2900 2708 RemD.exe 35 PID 2708 wrote to memory of 2900 2708 RemD.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7d36392836c350b47e1e485465f2446_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\RemD\RemD.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\RemD\RemD.exeC:\Users\Admin\AppData\Roaming\RemD\RemD.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵PID:2900
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410B
MD5991cad69a8a5ac8e22281a335b88e2b3
SHA158568a006ade6e2ca7fa25673b036bcefa303a7d
SHA25695d975c5b36f23f9121390f8f4a1373b1cbb8045765e1c9fa68e114e2f592d60
SHA512298dc73384bf23e913f9a92e83040d84171ef86630652f82f73367fec9e6c61eb8a6055afe03d997870e529e4e88c0f9571b6da8ca934311afdbb67aca3132ba
-
Filesize
648KB
MD5e7d36392836c350b47e1e485465f2446
SHA1b4cfaca779557d14cbccf09accefaf4ec8cec30e
SHA256e037f166b8e3066f5b8fc2f4dea6cf0d052dde5234b46c81e3d5ecf73dc713c2
SHA512c6f530cbfcf8d145e06c7850b1c51f2dc9efbd893229d12a2fe035be89d3c32979c803f4122f77278aa7d3595f70b99cd3fb867adeaea51fbafbaae7d265a3a1
-
Filesize
79B
MD54c5a202abda4dc922459e6a263e3eb3f
SHA1c9b493ec437e1fbf68b28e7ba972c26b7dd6f90f
SHA256a1c61aea64b28a71f979c19f47cd92065ebdf12249e8d7fc22255cd5f7aafbe1
SHA512e14001b4a956838e96c76c2b94bd1f2384df16aa77dbb2c4d8955d095c541a254b23dd80d34bc4c395459c84e7198c389d4f05c631674fb4e2edcc5bacd7a02a