Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe
-
Size
204KB
-
MD5
ea762b70a51701ea5df60188864012f7
-
SHA1
6537dca2d42107a5bbd00eb3b2ff81b8d03ecba4
-
SHA256
37c2e9cb5861942207cc86bdaaf7008540d702a9d07d7bba04be3b5eff8023a0
-
SHA512
8d48d0f7803c99fb4b4df3f3fe4436300aa312de8f21f28da1f25bb614fc72085dfa2eaca0632fba48f796012b9e99bba7a81ad329f6d835a45852cca1b21b89
-
SSDEEP
3072:0cUcm0X3qDOUwUNvo8Hj/64qDuibRTv1SKL6Vi2OJ:0cUK3qDpvTT6LDuibDb6VHO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1484 sesdessecetra.exe 3964 sesdessecetra.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1156 set thread context of 3692 1156 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 82 PID 1484 set thread context of 3964 1484 sesdessecetra.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sesdessecetra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sesdessecetra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1156 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 1484 sesdessecetra.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1156 wrote to memory of 3692 1156 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 82 PID 1156 wrote to memory of 3692 1156 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 82 PID 1156 wrote to memory of 3692 1156 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 82 PID 1156 wrote to memory of 3692 1156 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 82 PID 1156 wrote to memory of 3692 1156 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 82 PID 1156 wrote to memory of 3692 1156 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 82 PID 1156 wrote to memory of 3692 1156 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 82 PID 1156 wrote to memory of 3692 1156 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 82 PID 3692 wrote to memory of 1484 3692 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 83 PID 3692 wrote to memory of 1484 3692 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 83 PID 3692 wrote to memory of 1484 3692 ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe 83 PID 1484 wrote to memory of 3964 1484 sesdessecetra.exe 84 PID 1484 wrote to memory of 3964 1484 sesdessecetra.exe 84 PID 1484 wrote to memory of 3964 1484 sesdessecetra.exe 84 PID 1484 wrote to memory of 3964 1484 sesdessecetra.exe 84 PID 1484 wrote to memory of 3964 1484 sesdessecetra.exe 84 PID 1484 wrote to memory of 3964 1484 sesdessecetra.exe 84 PID 1484 wrote to memory of 3964 1484 sesdessecetra.exe 84 PID 1484 wrote to memory of 3964 1484 sesdessecetra.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea762b70a51701ea5df60188864012f7_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3964
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5ea762b70a51701ea5df60188864012f7
SHA16537dca2d42107a5bbd00eb3b2ff81b8d03ecba4
SHA25637c2e9cb5861942207cc86bdaaf7008540d702a9d07d7bba04be3b5eff8023a0
SHA5128d48d0f7803c99fb4b4df3f3fe4436300aa312de8f21f28da1f25bb614fc72085dfa2eaca0632fba48f796012b9e99bba7a81ad329f6d835a45852cca1b21b89