Analysis
-
max time kernel
31s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 02:44
Behavioral task
behavioral1
Sample
e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe
Resource
win7-20240704-en
Errors
General
-
Target
e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
e5e525016fda3fdc9884835112eb259e
-
SHA1
4c3fbe3a49a24c57b6f14e9ff134f847e817467a
-
SHA256
f2eb5f7bd13d1299cdeb030842c4a392565902ed5a30401e228a8c5b24ff92a1
-
SHA512
ae7afb4a76a93f1146ab049d31215d1e25e365171763f4e60ddfbab18c67f14c4d025433e5da173404b2391f24b95bf33169fe0eb14de0175db6787468c79c5b
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlj:86SIROiFJiwp0xlrlj
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1100 explorer.exe 3156 explorer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1304 set thread context of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 4124 set thread context of 4316 4124 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 94 PID 1100 set thread context of 3156 1100 explorer.exe 96 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4316 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 4316 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 4316 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 4316 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 1100 explorer.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 1304 wrote to memory of 4124 1304 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 84 PID 4124 wrote to memory of 4088 4124 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 85 PID 4124 wrote to memory of 4088 4124 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 85 PID 4124 wrote to memory of 4316 4124 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 94 PID 4124 wrote to memory of 4316 4124 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 94 PID 4124 wrote to memory of 4316 4124 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 94 PID 4124 wrote to memory of 4316 4124 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 94 PID 4124 wrote to memory of 4316 4124 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 94 PID 4316 wrote to memory of 1100 4316 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 95 PID 4316 wrote to memory of 1100 4316 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 95 PID 4316 wrote to memory of 1100 4316 e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe 95 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96 PID 1100 wrote to memory of 3156 1100 explorer.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe"2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5e525016fda3fdc9884835112eb259e_JaffaCakes118.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3156
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.6MB
MD512652d08c40a16b41cbad298cc10d974
SHA13e1139d060f0b778ee0ca3f8510ed8722519970f
SHA2561dfa527ea77ba240a8e267d85a54c04d8162705a90608d095e35f0795a19c2c1
SHA512aaaf848f0864c119698ce201dc046299b46f6c0f17922e5414bad6ac9bc172a00e366de310820ec61f423979a39aacd2855d047561f055cd68c04a2d6325a5fd