Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe
-
Size
501KB
-
MD5
ea7ac470b569370d17dd5f28953072a8
-
SHA1
faa5be3fc0dd21020abeea5364a5d0f360bd2320
-
SHA256
4611a65a5abdb83ec10940b9cf4f27bc21e2d0d9d81f46bce4ce965fb7010459
-
SHA512
99fe960961517d47b1fc7dffdbe8ea8eacbc3b1ae540a1a54eee2a9efd5bab4a21dac7f447579137ec86868388d5c692e8e2c82562e9a4844a5dd97d54c51396
-
SSDEEP
12288:IQeZEM4aLzp5uUU7d3OnsJBhiYzeZjfv+38qXAdUFu6:I5v+FOsJLZYvt06
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4456 cN28601KoLeJ28601.exe -
Executes dropped EXE 1 IoCs
pid Process 4456 cN28601KoLeJ28601.exe -
resource yara_rule behavioral2/memory/4972-2-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral2/memory/4972-14-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral2/memory/4972-15-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral2/memory/4456-25-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral2/memory/4456-33-0x0000000000400000-0x00000000004CF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cN28601KoLeJ28601 = "C:\\ProgramData\\cN28601KoLeJ28601\\cN28601KoLeJ28601.exe" cN28601KoLeJ28601.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cN28601KoLeJ28601.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4972 ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe 4972 ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4972 ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe Token: SeDebugPrivilege 4456 cN28601KoLeJ28601.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4456 cN28601KoLeJ28601.exe 4456 cN28601KoLeJ28601.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4456 4972 ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe 82 PID 4972 wrote to memory of 4456 4972 ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe 82 PID 4972 wrote to memory of 4456 4972 ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\ProgramData\cN28601KoLeJ28601\cN28601KoLeJ28601.exe"C:\ProgramData\cN28601KoLeJ28601\cN28601KoLeJ28601.exe" "C:\Users\Admin\AppData\Local\Temp\ea7ac470b569370d17dd5f28953072a8_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5c8016d70e13902932fe35ba514125473
SHA1a4431bcce563d9964e3a7bc7566caee22b174654
SHA256df78ee13c7f6970c2c68b0fb2c140fdd633521d1a50215b4cf0a984ff1506089
SHA512e6151c7d650ab9e42c31c30d84fe6117e186b124635036397d305ccf0ee92fb51834e91b6d7457d457f698d4992158cca410863a61c3b4d58e89030d60872144