Analysis
-
max time kernel
141s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
eabeddd32874fc3faaa2c5fc376a2b68_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabeddd32874fc3faaa2c5fc376a2b68_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eabeddd32874fc3faaa2c5fc376a2b68_JaffaCakes118.exe
-
Size
675KB
-
MD5
eabeddd32874fc3faaa2c5fc376a2b68
-
SHA1
7246ab9d36071f3544c72d4bd650e56280c0b07c
-
SHA256
ed2c855d10a335bc06a42d3c7f95e69775c33464f67555f07177e2702f4eac4d
-
SHA512
57467c02441aec71134cfc3971934a950b4cee62689c772b5c689110ef626eb38b9c3a1020de4f0ae1d709791df261e30fa6ef9f44bc3787e3c21335283a8436
-
SSDEEP
12288:SNWKzMpY1fuh/jwRTum0RnqMMQ60bQQfb0GMmk9/B8Cn8qtZnaLslm8cfg9yAriG:yWKzMpYodQg0GMmS//qslcB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 768 junhua.exe -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 118.184.184.8 Destination IP 118.184.184.8 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\junhua.exe eabeddd32874fc3faaa2c5fc376a2b68_JaffaCakes118.exe File created C:\Windows\junhua.exe eabeddd32874fc3faaa2c5fc376a2b68_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eabeddd32874fc3faaa2c5fc376a2b68_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language junhua.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ junhua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" junhua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" junhua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" junhua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" junhua.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5072 eabeddd32874fc3faaa2c5fc376a2b68_JaffaCakes118.exe Token: SeDebugPrivilege 768 junhua.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 768 junhua.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 768 wrote to memory of 720 768 junhua.exe 83 PID 768 wrote to memory of 720 768 junhua.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\eabeddd32874fc3faaa2c5fc376a2b68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eabeddd32874fc3faaa2c5fc376a2b68_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
C:\Windows\junhua.exeC:\Windows\junhua.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
675KB
MD5eabeddd32874fc3faaa2c5fc376a2b68
SHA17246ab9d36071f3544c72d4bd650e56280c0b07c
SHA256ed2c855d10a335bc06a42d3c7f95e69775c33464f67555f07177e2702f4eac4d
SHA51257467c02441aec71134cfc3971934a950b4cee62689c772b5c689110ef626eb38b9c3a1020de4f0ae1d709791df261e30fa6ef9f44bc3787e3c21335283a8436