Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 10:50
Static task
static1
Behavioral task
behavioral1
Sample
e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe
-
Size
244KB
-
MD5
e8f3b6078e6629f2f9e0ccff6074df39
-
SHA1
77f477758e2f646f66664be70e99da9dff71a02a
-
SHA256
1224fa13afd1f551b4400cf7c6e35da7d686824e3e9191ee8714d620660c5fbb
-
SHA512
5d7a65fe447d3297fecafbac8f815295d2de7fefe2b9053a3f22464b351c5e4bc2abb76a13ed1e2760f7b4354fa49813b800a99a478c859bec7cfb77fe4d9f77
-
SSDEEP
6144:4BQ+48EIY22Fy+154GSlz9kBCFJETm7KBTdYEvf5q/jveLu:4BN48E/54xlz9kAmBfYEA/bgu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2784 Scg.exe -
Loads dropped DLL 2 IoCs
pid Process 2656 cmd.exe 2656 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2784 set thread context of 2536 2784 Scg.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2632 e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe 2784 Scg.exe 2784 Scg.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2632 e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe 2784 Scg.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2776 2632 e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2776 2632 e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2776 2632 e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2776 2632 e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2656 2776 WScript.exe 31 PID 2776 wrote to memory of 2656 2776 WScript.exe 31 PID 2776 wrote to memory of 2656 2776 WScript.exe 31 PID 2776 wrote to memory of 2656 2776 WScript.exe 31 PID 2656 wrote to memory of 2784 2656 cmd.exe 33 PID 2656 wrote to memory of 2784 2656 cmd.exe 33 PID 2656 wrote to memory of 2784 2656 cmd.exe 33 PID 2656 wrote to memory of 2784 2656 cmd.exe 33 PID 2784 wrote to memory of 2536 2784 Scg.exe 34 PID 2784 wrote to memory of 2536 2784 Scg.exe 34 PID 2784 wrote to memory of 2536 2784 Scg.exe 34 PID 2784 wrote to memory of 2536 2784 Scg.exe 34 PID 2784 wrote to memory of 2536 2784 Scg.exe 34 PID 2784 wrote to memory of 2536 2784 Scg.exe 34 PID 2784 wrote to memory of 2536 2784 Scg.exe 34 PID 2784 wrote to memory of 2536 2784 Scg.exe 34 PID 2784 wrote to memory of 2536 2784 Scg.exe 34 PID 2784 wrote to memory of 2536 2784 Scg.exe 34 PID 2784 wrote to memory of 2536 2784 Scg.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\RSSCom\Scg.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\RSSCom\Scg.exeC:\Users\Admin\AppData\Roaming\RSSCom\Scg.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵PID:2536
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412B
MD586c39fbe1dc4d30557695bb2ca71401b
SHA1436ebc86cd6208bf06d5b4c3a436b2929363a8b4
SHA256b6042a1f0d1222ebdd74836fc7d665af97e9c7b6e938a1a5f3a6e88ca1597809
SHA512a25f2bad6ec4ba1e297f82ec3a80e74c0c7c62ae3c0fce45e58f751b14d23bb80ac79ea9e82ba3f5f3161f2006f29a0f4a911d23cb69f65fe0eb938031740fe0
-
Filesize
79B
MD50568c903de514d3b007b2628bc11b545
SHA1516dca0e427ff650f792cda3541e2890c2104003
SHA256369a86970cb70cd83c8786c9d0106246bd9d1c857a68581ad997853601b9c0bb
SHA5120526ca79433d9cc9a240222b81cefe10aca6a0f29e6947464aefd9e6cb55b2adf0cfdd044b5803f5be45b9128e8f075812bdc3f00d051b9cff84402c3ef864d9
-
Filesize
244KB
MD5e8f3b6078e6629f2f9e0ccff6074df39
SHA177f477758e2f646f66664be70e99da9dff71a02a
SHA2561224fa13afd1f551b4400cf7c6e35da7d686824e3e9191ee8714d620660c5fbb
SHA5125d7a65fe447d3297fecafbac8f815295d2de7fefe2b9053a3f22464b351c5e4bc2abb76a13ed1e2760f7b4354fa49813b800a99a478c859bec7cfb77fe4d9f77