Analysis
-
max time kernel
95s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
ea835b9a0fc31fe1e60e4eb62db2efe0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea835b9a0fc31fe1e60e4eb62db2efe0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea835b9a0fc31fe1e60e4eb62db2efe0_JaffaCakes118.exe
-
Size
303KB
-
MD5
ea835b9a0fc31fe1e60e4eb62db2efe0
-
SHA1
f09436ee4d09687bcb39ee797296c5889414127b
-
SHA256
770890510df148eb795f8df72dbe7b6034a89b009c998768a4b7ce1f9d0fce58
-
SHA512
3e1d9f5955f0442d8a552ef0622442717441c47c6932f74793753039a750399a0643a6e3a80107ddc1841adb9e290fb34c3846eaac9afc25097227a77a5d0af7
-
SSDEEP
6144:M/0uoBSnq7hnygsHvsGXSO5zdGB99hfGgyUnWXUO1b3ROf5FC33:MJOLsdiao9GjUO3ROfDCH
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 868 crypted.exe 1112 crypted.exe 756 MYSEX~1.EXE 448 MYSEX~1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea835b9a0fc31fe1e60e4eb62db2efe0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" crypted.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 868 set thread context of 1112 868 crypted.exe 83 PID 756 set thread context of 448 756 MYSEX~1.EXE 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea835b9a0fc31fe1e60e4eb62db2efe0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYSEX~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYSEX~1.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 448 MYSEX~1.exe 448 MYSEX~1.exe 448 MYSEX~1.exe 448 MYSEX~1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 868 crypted.exe 756 MYSEX~1.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1856 wrote to memory of 868 1856 ea835b9a0fc31fe1e60e4eb62db2efe0_JaffaCakes118.exe 82 PID 1856 wrote to memory of 868 1856 ea835b9a0fc31fe1e60e4eb62db2efe0_JaffaCakes118.exe 82 PID 1856 wrote to memory of 868 1856 ea835b9a0fc31fe1e60e4eb62db2efe0_JaffaCakes118.exe 82 PID 868 wrote to memory of 1112 868 crypted.exe 83 PID 868 wrote to memory of 1112 868 crypted.exe 83 PID 868 wrote to memory of 1112 868 crypted.exe 83 PID 868 wrote to memory of 1112 868 crypted.exe 83 PID 868 wrote to memory of 1112 868 crypted.exe 83 PID 868 wrote to memory of 1112 868 crypted.exe 83 PID 868 wrote to memory of 1112 868 crypted.exe 83 PID 868 wrote to memory of 1112 868 crypted.exe 83 PID 1112 wrote to memory of 756 1112 crypted.exe 84 PID 1112 wrote to memory of 756 1112 crypted.exe 84 PID 1112 wrote to memory of 756 1112 crypted.exe 84 PID 756 wrote to memory of 448 756 MYSEX~1.EXE 85 PID 756 wrote to memory of 448 756 MYSEX~1.EXE 85 PID 756 wrote to memory of 448 756 MYSEX~1.EXE 85 PID 756 wrote to memory of 448 756 MYSEX~1.EXE 85 PID 756 wrote to memory of 448 756 MYSEX~1.EXE 85 PID 756 wrote to memory of 448 756 MYSEX~1.EXE 85 PID 756 wrote to memory of 448 756 MYSEX~1.EXE 85 PID 448 wrote to memory of 3404 448 MYSEX~1.exe 55 PID 448 wrote to memory of 3404 448 MYSEX~1.exe 55 PID 448 wrote to memory of 3404 448 MYSEX~1.exe 55 PID 448 wrote to memory of 3404 448 MYSEX~1.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\ea835b9a0fc31fe1e60e4eb62db2efe0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea835b9a0fc31fe1e60e4eb62db2efe0_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MYSEX~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MYSEX~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MYSEX~1.exe"C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MYSEX~1.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:448
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5925f15d78cbb988f4b308ef6054fca82
SHA1a7959c48927044bd0c2dd216609f8ac02a7aaa10
SHA25649a324e757f7497f833c81dfe1e147261e7b38c779aab8b1fb21f290379949e3
SHA512051456b2b47031dd011b4b71d8d8f226eabbfd688bd556a745652be7e9f8c185da3a10b7e7f22f976708e3433fc2e41f5d034f5779e4b13764dca7cdabc5740d
-
Filesize
177KB
MD555cd9d8f22a317b2dbf7350584e48099
SHA13c1bd7be15b8c17398f8dc934ded916fca62f53f
SHA256a94c2a49508a974b02e6aa161b7444a7eb9b81626e2c5e9da7272764ab179df8
SHA512b432b38453bd4614c11f1b9c0ff955a7a7fcd0f67f7cfb8aa90e9883cfca46b18c8913a90cc06453fb864dc9a4f1bf8690b106a0d294c549355e8f489c2c5204