Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe
-
Size
248KB
-
MD5
eaa7dab76ed6306409d4f1c4223de987
-
SHA1
1edfaa87059d62e1d64bf6fee1ab997f5d4835d0
-
SHA256
668ce0c1cb9b53b9d86714fc3bf48ef4c4b623244b21c0b4c418244a4ea5abe5
-
SHA512
ef1d0b6c3278abfc5b28e22cf7e1e0d4329439ac011ded1daf19eec3e52a5c6e82f0c3ca5031dd6f4286d3199696769f90e12a7a6036dce5d5b3decd4940692b
-
SSDEEP
3072:pQYnYfB/uo4k72ciWLJdVyAtbjpOCXH2YdM6J7NmtnMJ2lmU:pQYsB/uEPNaAtbj9H2YdldNUMUlmU
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2708 lalg.exe -
Loads dropped DLL 2 IoCs
pid Process 2748 eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe 2748 eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\lalg.exe eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2720 sc.exe 2168 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lalg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2708 2748 eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2708 2748 eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2708 2748 eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe 31 PID 2748 wrote to memory of 2708 2748 eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2720 2708 lalg.exe 32 PID 2708 wrote to memory of 2720 2708 lalg.exe 32 PID 2708 wrote to memory of 2720 2708 lalg.exe 32 PID 2708 wrote to memory of 2720 2708 lalg.exe 32 PID 2708 wrote to memory of 2168 2708 lalg.exe 33 PID 2708 wrote to memory of 2168 2708 lalg.exe 33 PID 2708 wrote to memory of 2168 2708 lalg.exe 33 PID 2708 wrote to memory of 2168 2708 lalg.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\WINDOWS\SysWOW64\lalg.exeC:\WINDOWS\system32\lalg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\WINDOWS\SysWOW64\sc.exesc.exe delete "Webserv"3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\WINDOWS\SysWOW64\sc.exesc.exe Create "Webserv" type= own type= interact start= auto DisplayName= "web" binPath= "cmd.exe /c start "C:\WINDOWS\SysWOW64\lalg.exe"3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD58c823919c151f175fa7951c4e2e1c3df
SHA1b0970b7375f40d211116b09ac96e334fe473bf48
SHA256a1d606d98bc955ef814dc9167dec6e8d44003d5a74185598c8418aff0a4d3e9f
SHA5121740ae25c977828f042c5eb3c77f4c118f386356393b71a63614f2ac792d14df3449e9ffc87521e2b5be6a7ba199b45b2b89ec0922fbce80725972992e09d44f