Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe
-
Size
204KB
-
MD5
ea762b70a51701ea5df60188864012f7
-
SHA1
6537dca2d42107a5bbd00eb3b2ff81b8d03ecba4
-
SHA256
37c2e9cb5861942207cc86bdaaf7008540d702a9d07d7bba04be3b5eff8023a0
-
SHA512
8d48d0f7803c99fb4b4df3f3fe4436300aa312de8f21f28da1f25bb614fc72085dfa2eaca0632fba48f796012b9e99bba7a81ad329f6d835a45852cca1b21b89
-
SSDEEP
3072:0cUcm0X3qDOUwUNvo8Hj/64qDuibRTv1SKL6Vi2OJ:0cUK3qDpvTT6LDuibDb6VHO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2360 sesdessecetra.exe 2412 sesdessecetra.exe -
Loads dropped DLL 8 IoCs
pid Process 572 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 2360 sesdessecetra.exe 2360 sesdessecetra.exe 2360 sesdessecetra.exe 2360 sesdessecetra.exe 2412 sesdessecetra.exe 2412 sesdessecetra.exe 2412 sesdessecetra.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2104 set thread context of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2360 set thread context of 2412 2360 sesdessecetra.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sesdessecetra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sesdessecetra.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 2360 sesdessecetra.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 2104 wrote to memory of 572 2104 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 31 PID 572 wrote to memory of 2360 572 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 32 PID 572 wrote to memory of 2360 572 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 32 PID 572 wrote to memory of 2360 572 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 32 PID 572 wrote to memory of 2360 572 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 32 PID 572 wrote to memory of 2360 572 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 32 PID 572 wrote to memory of 2360 572 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 32 PID 572 wrote to memory of 2360 572 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 32 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33 PID 2360 wrote to memory of 2412 2360 sesdessecetra.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2412
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5ea762b70a51701ea5df60188864012f7
SHA16537dca2d42107a5bbd00eb3b2ff81b8d03ecba4
SHA25637c2e9cb5861942207cc86bdaaf7008540d702a9d07d7bba04be3b5eff8023a0
SHA5128d48d0f7803c99fb4b4df3f3fe4436300aa312de8f21f28da1f25bb614fc72085dfa2eaca0632fba48f796012b9e99bba7a81ad329f6d835a45852cca1b21b89