Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe
-
Size
13KB
-
MD5
e9db65748b6a833e556d5c3393cdddae
-
SHA1
d242e83844f7f82ff8eabf18c3f19313845c7fe9
-
SHA256
aa32a8d6fe434350d96fc75f3536fc35a8713561d39d2e64893617bc4b4fa1f0
-
SHA512
41b033189ae8dc7b2f80360d1dfeef3f8584d0dab9b37a7eaf5d3d4a779a53404029474a2f8c76ef78b993ce00c9e9b12cb17c49b0fc61508bd8749ed1c255fe
-
SSDEEP
384:5tLoqw7DpkFqQon+hJEVNnznQ91XCQ1EA9PoKgLpN:3o2Fg6YNznQ91XCQ1Rf4r
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\jfytrcqq.dll = "{F0930A2F-D971-4828-8209-B7DFD266ED44}" e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2900 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\jfytrcqq.tmp e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jfytrcqq.tmp e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jfytrcqq.nls e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F0930A2F-D971-4828-8209-B7DFD266ED44} e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F0930A2F-D971-4828-8209-B7DFD266ED44}\InProcServer32 e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F0930A2F-D971-4828-8209-B7DFD266ED44}\InProcServer32\ = "C:\\Windows\\SysWow64\\jfytrcqq.dll" e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F0930A2F-D971-4828-8209-B7DFD266ED44}\InProcServer32\ThreadingModel = "Apartment" e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2108 e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2108 e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe 2108 e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe 2108 e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2900 2108 e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe 31 PID 2108 wrote to memory of 2900 2108 e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe 31 PID 2108 wrote to memory of 2900 2108 e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe 31 PID 2108 wrote to memory of 2900 2108 e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9db65748b6a833e556d5c3393cdddae_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\C21.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD571f35362cb42fc7a5d5ab18d3289ac66
SHA1a2f8bdb402d635db091bb828e96a8f38a029341b
SHA256555f9a9c33aee643681906e0d38e39a12ffbd4d4da0641e2e4a6732f6c0d6154
SHA512dae94460598251dbd75c6e5d75f5e99d91ccdd0a7e3a2a15b453a088cc88c2ae8bccaeabab9ff1847cef8ed5412bfbf14b7f2397fe0d70a3d82821ec41c63dad
-
Filesize
428B
MD5cb57debbe24ccb28ed9c534ef6171200
SHA19cdd93a7dcc0f57691bd8764d61cd57db6d4df2a
SHA256161b5bc5b5b330df3b84b5f44d3200388a1c245d4c0483cab12117ca93bd48e9
SHA512f7dcdb18052d0f69e19ad2de8db591755205cb7391c557f1d01d1a82f71851f24b5b78fc50618de5ef024234003989f8356550bee25525ded3ee4284037d9082
-
Filesize
2.1MB
MD50a3e3611c33c2fbc12665baac51ef0da
SHA16f6d06962222fbf8331a8c0434db3792ed0e64ae
SHA2562e374e3e4cbc515fe0c61156edb0370c340648e09653b876ae5220f11962b5c9
SHA5120030428f6ca823364665b968af2def4da5662b7fb5160182134e07d8a2c445e806ca12c0a71f60684cc99c84b12cd991adef317f25f401ab42dbda4f1417f58d