Analysis
-
max time kernel
132s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe
-
Size
288KB
-
MD5
ea70a8b24452eac62f7b62dbefa378cb
-
SHA1
b3b61ef34eabb70b1411353796f563c0f5a683d5
-
SHA256
9647ba89d49ee73f7d8dc3139204aa59d7722d5c874b78a5fd85d266b78d2beb
-
SHA512
2d85fb354c8dd58723527f1a4b61e124acffaa7efc0d2c9a3cef93a7a6099fe921697698625d1955895a8749a364b7aacf1bb375b000e38a93993a842845b92b
-
SSDEEP
6144:OMEMOBvYSf5Ka5H1yz79jTzahpZpFsMmKAae0dX:OMEMCwo0a+39+nZpFpmKAae0dX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2744 tmp1.exe 320 tmp2.exe 2712 svchosts.exe 2572 tmp2.exe -
Loads dropped DLL 7 IoCs
pid Process 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 2744 tmp1.exe 2744 tmp1.exe 320 tmp2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU Key = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM Key = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 320 set thread context of 2572 320 tmp2.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2572 tmp2.exe 2572 tmp2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 320 tmp2.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2744 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2744 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2744 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2744 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 30 PID 2180 wrote to memory of 320 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 31 PID 2180 wrote to memory of 320 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 31 PID 2180 wrote to memory of 320 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 31 PID 2180 wrote to memory of 320 2180 ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe 31 PID 2744 wrote to memory of 2712 2744 tmp1.exe 32 PID 2744 wrote to memory of 2712 2744 tmp1.exe 32 PID 2744 wrote to memory of 2712 2744 tmp1.exe 32 PID 2744 wrote to memory of 2712 2744 tmp1.exe 32 PID 320 wrote to memory of 2572 320 tmp2.exe 33 PID 320 wrote to memory of 2572 320 tmp2.exe 33 PID 320 wrote to memory of 2572 320 tmp2.exe 33 PID 320 wrote to memory of 2572 320 tmp2.exe 33 PID 320 wrote to memory of 2572 320 tmp2.exe 33 PID 320 wrote to memory of 2572 320 tmp2.exe 33 PID 320 wrote to memory of 2572 320 tmp2.exe 33 PID 320 wrote to memory of 2572 320 tmp2.exe 33 PID 2572 wrote to memory of 1204 2572 tmp2.exe 21 PID 2572 wrote to memory of 1204 2572 tmp2.exe 21 PID 2572 wrote to memory of 1204 2572 tmp2.exe 21 PID 2572 wrote to memory of 1204 2572 tmp2.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea70a8b24452eac62f7b62dbefa378cb_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\tmp1.exe"C:\Users\Admin\AppData\Local\Temp\tmp1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\svchosts.exe"C:\Users\Admin\AppData\Roaming\svchosts.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2712
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp2.exe"C:\Users\Admin\AppData\Local\Temp\tmp2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\tmp2.exeC:\Users\Admin\AppData\Local\Temp\tmp2.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5dcc1198b6e043b8a1da246332ba5e6b5
SHA19ef5b5d4316b00f74bb4c48e8fe3dad7711b7a00
SHA2565ef09f8720ae997228e778d4d30101a439164cdf5e5ca5892011e2d4b1a4486f
SHA512a5e954b5d54ecf712103c32eb98087584bf8cea63bed8096f62d745e793a43560b3b95f32cc46fcfe8f2a56f308cef1ec58360b049c8c2ee5c38112a3a512e3e
-
Filesize
220KB
MD5ab094c547f106567f5557d800afc3a1e
SHA119ff82b880230e64edf734847d07cfe48cb756e8
SHA256ef85121ad77820e587e095431186f51edd5cdaddb1e757bf87f123ceec365d0b
SHA51260d4d2d4e426cbe13977973c82d22fdd536e5675329c21af17403e9ed64de936bbea270157c81f812fb6baa720836d8802e830d763efe0860932ac189c4c4295