Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe
-
Size
196KB
-
MD5
ea7adddaab831ed5adb649427ed208b9
-
SHA1
21b80e11adf4b78f71a41ccd7dbad4de6a729910
-
SHA256
3fc702bd7d98fd6548ea0e425082c331138eaedd24e16eb89dc249849f3b89b9
-
SHA512
2a2a3618798f438e2c98abc439359d382871e2cac83e466a8c35d9ac85be3b8c3756e7d5f0087f6c1625585c662e00c97f1e50809bc22171be5d31e3678b066a
-
SSDEEP
3072:IZLvq8JxIKltUUP0ZJBeDkO2tg24BkeDkO2tg24BqWg11DOH6kzvVpWhf4BCJaA4:cxVltUUPCg/bH/baGpWhQnJ0/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3068 mscn.exe -
Loads dropped DLL 1 IoCs
pid Process 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Local\\mscn.exe" ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe Token: 33 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe Token: SeDebugPrivilege 3068 mscn.exe Token: 33 3068 mscn.exe Token: SeIncBasePriorityPrivilege 3068 mscn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 3068 mscn.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1720 wrote to memory of 3068 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 30 PID 1720 wrote to memory of 3068 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 30 PID 1720 wrote to memory of 3068 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 30 PID 1720 wrote to memory of 3068 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 30 PID 1720 wrote to memory of 3068 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 30 PID 1720 wrote to memory of 3068 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 30 PID 1720 wrote to memory of 3068 1720 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2828 3068 mscn.exe 31 PID 3068 wrote to memory of 2828 3068 mscn.exe 31 PID 3068 wrote to memory of 2828 3068 mscn.exe 31 PID 3068 wrote to memory of 2828 3068 mscn.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\mscn.exe"C:\Users\Admin\AppData\Local\mscn.exe" ONCE2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\PAYMENT COPY.txt3⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5ea7adddaab831ed5adb649427ed208b9
SHA121b80e11adf4b78f71a41ccd7dbad4de6a729910
SHA2563fc702bd7d98fd6548ea0e425082c331138eaedd24e16eb89dc249849f3b89b9
SHA5122a2a3618798f438e2c98abc439359d382871e2cac83e466a8c35d9ac85be3b8c3756e7d5f0087f6c1625585c662e00c97f1e50809bc22171be5d31e3678b066a