Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe
-
Size
24KB
-
MD5
ea8e89bd368d349934a4a16f4be11c55
-
SHA1
8ad7d83afe41997c9bc7cae2e399fd5f93ad9926
-
SHA256
38431e742ccad186d2bb06f288f3b24b926a993a4d29d370430490981772f333
-
SHA512
c26fd0e202a9f96bb8fcbbc4a672e5be9e0d202400fe482243dcd11723aade404ef3823a63c2df0459cf6321373e356d181dcc1c9e507185f756835896d3d282
-
SSDEEP
384:E3eVES+/xwGkRKJRPYIlM61qmTTMVF9/q5K0:bGS+ZfbJfO8qYoA7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1812 tasklist.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1248 NETSTAT.EXE 2564 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1812 tasklist.exe Token: SeDebugPrivilege 1248 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2668 ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe 2668 ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2916 2668 ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2916 2668 ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2916 2668 ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2916 2668 ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe 30 PID 2916 wrote to memory of 2512 2916 cmd.exe 32 PID 2916 wrote to memory of 2512 2916 cmd.exe 32 PID 2916 wrote to memory of 2512 2916 cmd.exe 32 PID 2916 wrote to memory of 2512 2916 cmd.exe 32 PID 2916 wrote to memory of 2564 2916 cmd.exe 33 PID 2916 wrote to memory of 2564 2916 cmd.exe 33 PID 2916 wrote to memory of 2564 2916 cmd.exe 33 PID 2916 wrote to memory of 2564 2916 cmd.exe 33 PID 2916 wrote to memory of 1812 2916 cmd.exe 34 PID 2916 wrote to memory of 1812 2916 cmd.exe 34 PID 2916 wrote to memory of 1812 2916 cmd.exe 34 PID 2916 wrote to memory of 1812 2916 cmd.exe 34 PID 2916 wrote to memory of 2776 2916 cmd.exe 36 PID 2916 wrote to memory of 2776 2916 cmd.exe 36 PID 2916 wrote to memory of 2776 2916 cmd.exe 36 PID 2916 wrote to memory of 2776 2916 cmd.exe 36 PID 2776 wrote to memory of 3000 2776 net.exe 37 PID 2776 wrote to memory of 3000 2776 net.exe 37 PID 2776 wrote to memory of 3000 2776 net.exe 37 PID 2776 wrote to memory of 3000 2776 net.exe 37 PID 2916 wrote to memory of 1248 2916 cmd.exe 38 PID 2916 wrote to memory of 1248 2916 cmd.exe 38 PID 2916 wrote to memory of 1248 2916 cmd.exe 38 PID 2916 wrote to memory of 1248 2916 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea8e89bd368d349934a4a16f4be11c55_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2564
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5f1bccb15f5a3133196b761f3553bcda3
SHA16a01b6fd98d24b09b3a4b08c0c8ee16138f08255
SHA25638b5b6f568e7d4daee9aa43e008487c9d937f327dcd56d3b6d79b58ae9d2091e
SHA512667d7943393e268352e4c391de271f8aef593ac21629c313869329a2ded165a0baefa546dfe181ba7efec722dc438aed96139788cd7c5aa41cfef433a484253c