Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
eac08db3fa1c18e939aba316744b3aeb
-
SHA1
262dd8ad27f510a2a53fdb7e5f8915a82bd108d1
-
SHA256
9399ffc9d442614d48abd29418d5872405a3a19ac77b9646cf39bf44bb0b0483
-
SHA512
aac17f8de6f35b740b4bf6d18f55fb2c5f399ff6d902db1fef6c3ce9ce0abb2eb3b21eee85fea537c6fce40fbfaa311edef4d34d722d084aedf2b88acec063de
-
SSDEEP
24576:s6QJy1KWYl+CyvvgkOYoNWcMTsUEb2UMNKElXS4cWquWmWzeysLWJo:9Dt9OYoNkTsrL4cWquWmWzevCJo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2536 usnscv.exe -
Loads dropped DLL 7 IoCs
pid Process 2380 eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe 2380 eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe 2536 usnscv.exe 2948 WerFault.exe 2948 WerFault.exe 2948 WerFault.exe 2948 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon = "\"C:\\Users\\Admin\\AppData\\Local\\usnscv.exe\"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2948 2536 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usnscv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2324 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2536 usnscv.exe 2536 usnscv.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2536 usnscv.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2536 2380 eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2536 2380 eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2536 2380 eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2536 2380 eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2812 2536 usnscv.exe 31 PID 2536 wrote to memory of 2812 2536 usnscv.exe 31 PID 2536 wrote to memory of 2812 2536 usnscv.exe 31 PID 2536 wrote to memory of 2812 2536 usnscv.exe 31 PID 2536 wrote to memory of 2812 2536 usnscv.exe 31 PID 2536 wrote to memory of 2812 2536 usnscv.exe 31 PID 2536 wrote to memory of 2812 2536 usnscv.exe 31 PID 2812 wrote to memory of 1156 2812 cmd.exe 33 PID 2812 wrote to memory of 1156 2812 cmd.exe 33 PID 2812 wrote to memory of 1156 2812 cmd.exe 33 PID 2812 wrote to memory of 1156 2812 cmd.exe 33 PID 1156 wrote to memory of 2324 1156 cmd.exe 34 PID 1156 wrote to memory of 2324 1156 cmd.exe 34 PID 1156 wrote to memory of 2324 1156 cmd.exe 34 PID 1156 wrote to memory of 2324 1156 cmd.exe 34 PID 2536 wrote to memory of 2948 2536 usnscv.exe 36 PID 2536 wrote to memory of 2948 2536 usnscv.exe 36 PID 2536 wrote to memory of 2948 2536 usnscv.exe 36 PID 2536 wrote to memory of 2948 2536 usnscv.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\usnscv.exe"C:\Users\Admin\AppData\Local\usnscv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\winupdate.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V ctfmon /D "\"C:\Users\Admin\AppData\Local\usnscv.exe\"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V ctfmon /D "\"C:\Users\Admin\AppData\Local\usnscv.exe\"" /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2324
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 6043⤵
- Loads dropped DLL
- Program crash
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD56f893fa27049e87617787e4964ad5ecb
SHA12efa3418e797e4d5ced66044eff405cb2f93060c
SHA256a9912cc06ab8465ecbf27c5b6887ba94421e213d1fff1467ee1d8f20a72f0b60
SHA51208188fd11947612212701c3fffc253bb69530091115cf6c59650ed70851a8b56b5508cf458df9e742956144be1b3738560a33871a4be782798a63f04b7dae57f
-
Filesize
371KB
MD5261f8f41c5ebde7d803a9f5b54a0a31d
SHA1562b4a28bb63bc1f5fb3e1929542b401613a71c2
SHA2569c4babe2ac629a565f9a6ed31ca9a93b2e764dc5449ecb5b54a05ff154e6a222
SHA512ae3a87d6560c3b9e905b4e76d0c97407fd49dc700ddb2090963e7f51eb6a0cd16a9fa13464425400994d7589334cf0d61d2e06c9a65491bd180f9f8543d28058
-
Filesize
676KB
MD504eaeafbb8694b0ebcbfde1aa57a94f7
SHA131efde2ba3e1e6f9e2260fa06ed5947a088b6579
SHA256de96b38a3e13383e2e9300d03a69706750c170e3bcb8ede863266b4683e58fb5
SHA5123345fa02ee2708d766718cc9b56c93b2096c516e9ea647533379e2f4a54e5ca0ac1bce2348659fe03bcd0d954300fd42acc2ed36ee4f61579839059dbad9a9c7