Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe
-
Size
248KB
-
MD5
eaa7dab76ed6306409d4f1c4223de987
-
SHA1
1edfaa87059d62e1d64bf6fee1ab997f5d4835d0
-
SHA256
668ce0c1cb9b53b9d86714fc3bf48ef4c4b623244b21c0b4c418244a4ea5abe5
-
SHA512
ef1d0b6c3278abfc5b28e22cf7e1e0d4329439ac011ded1daf19eec3e52a5c6e82f0c3ca5031dd6f4286d3199696769f90e12a7a6036dce5d5b3decd4940692b
-
SSDEEP
3072:pQYnYfB/uo4k72ciWLJdVyAtbjpOCXH2YdM6J7NmtnMJ2lmU:pQYsB/uEPNaAtbj9H2YdldNUMUlmU
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 624 lalg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\lalg.exe eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4048 sc.exe 4352 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lalg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2100 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2100 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4952 wrote to memory of 624 4952 eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe 83 PID 4952 wrote to memory of 624 4952 eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe 83 PID 4952 wrote to memory of 624 4952 eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe 83 PID 624 wrote to memory of 4352 624 lalg.exe 84 PID 624 wrote to memory of 4352 624 lalg.exe 84 PID 624 wrote to memory of 4352 624 lalg.exe 84 PID 624 wrote to memory of 4048 624 lalg.exe 85 PID 624 wrote to memory of 4048 624 lalg.exe 85 PID 624 wrote to memory of 4048 624 lalg.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaa7dab76ed6306409d4f1c4223de987_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\WINDOWS\SysWOW64\lalg.exeC:\WINDOWS\system32\lalg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\WINDOWS\SysWOW64\sc.exesc.exe delete "Webserv"3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4352
-
-
C:\WINDOWS\SysWOW64\sc.exesc.exe Create "Webserv" type= own type= interact start= auto DisplayName= "web" binPath= "cmd.exe /c start "C:\WINDOWS\SysWOW64\lalg.exe"3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4048
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x46c 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD58c823919c151f175fa7951c4e2e1c3df
SHA1b0970b7375f40d211116b09ac96e334fe473bf48
SHA256a1d606d98bc955ef814dc9167dec6e8d44003d5a74185598c8418aff0a4d3e9f
SHA5121740ae25c977828f042c5eb3c77f4c118f386356393b71a63614f2ac792d14df3449e9ffc87521e2b5be6a7ba199b45b2b89ec0922fbce80725972992e09d44f