Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
eab0145f3ee03d8a04d9f751ab7dca65
-
SHA1
93a4ae73c44485f8fb40932857d11c09af70523e
-
SHA256
94c9af378ea3598ea7e2549d575e977d81134a350d0c6b00beea82ada4f0c256
-
SHA512
0166c3b5eba4ba2d77ab816a590c7c0e932b8d68d18603b7609d758c89239896b6f9489fd65a7d352b9d6e1555cafd8b5cd2fef943fca4793b73864d4ee838a9
-
SSDEEP
24576:OEXHRQLv8tl+wwiL2h602l3EUC27NSAHHib:x+DwwiLq6fPCStib
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1912 setups.exe 3012 csrsl.exe 2076 lssas.exe 2516 lssas.exe -
resource yara_rule behavioral2/files/0x0007000000023479-5.dat upx behavioral2/memory/1912-6-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x000700000002347b-13.dat upx behavioral2/memory/3012-14-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x000700000002347c-21.dat upx behavioral2/memory/2076-22-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2516-30-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1912-32-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3012-34-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2076-35-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrsl = "C:\\WINDOWS\\system32\\csrsl.exe" csrsl.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lssas = "C:\\WINDOWS\\system32\\lssas.exe" lssas.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lssas = "C:\\WINDOWS\\system32\\lssas.exe" lssas.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\setups.exe eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\csrsl.exe setups.exe File opened for modification C:\WINDOWS\SysWOW64\lssas.exe setups.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setups.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lssas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lssas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1912 setups.exe 1912 setups.exe 2076 lssas.exe 2076 lssas.exe 2516 lssas.exe 2516 lssas.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 1912 setups.exe Token: SeSystemtimePrivilege 1912 setups.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2268 eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe 1912 setups.exe 3012 csrsl.exe 3012 csrsl.exe 3012 csrsl.exe 2076 lssas.exe 2516 lssas.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1912 2268 eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe 85 PID 2268 wrote to memory of 1912 2268 eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe 85 PID 2268 wrote to memory of 1912 2268 eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe 85 PID 1912 wrote to memory of 3012 1912 setups.exe 86 PID 1912 wrote to memory of 3012 1912 setups.exe 86 PID 1912 wrote to memory of 3012 1912 setups.exe 86 PID 1912 wrote to memory of 2516 1912 setups.exe 87 PID 1912 wrote to memory of 2516 1912 setups.exe 87 PID 1912 wrote to memory of 2516 1912 setups.exe 87 PID 3012 wrote to memory of 2076 3012 csrsl.exe 88 PID 3012 wrote to memory of 2076 3012 csrsl.exe 88 PID 3012 wrote to memory of 2076 3012 csrsl.exe 88 PID 2268 wrote to memory of 5088 2268 eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe 89 PID 2268 wrote to memory of 5088 2268 eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe 89 PID 2268 wrote to memory of 5088 2268 eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab0145f3ee03d8a04d9f751ab7dca65_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\WINDOWS\SysWOW64\setups.exeC:\WINDOWS\system32\setups.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\WINDOWS\SysWOW64\csrsl.exeC:\WINDOWS\system32\csrsl.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\WINDOWS\SysWOW64\lssas.exelssas.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
-
C:\WINDOWS\SysWOW64\lssas.exeC:\WINDOWS\system32\lssas.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 1.bat2⤵
- System Location Discovery: System Language Discovery
PID:5088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36B
MD51d0afaeccdf6282ca9043b118ac6bfc0
SHA15f79da9e0a044ddaec0f9ff406f50f656291cad3
SHA25618b8de1ab184306a936a8b58c2e61eb66e4d7f5343e4f46943648ba2efd22e23
SHA51263ff99869694e6e2b02527fe8c128c2adbc64f58d0d5039d05deca614e91f09ce069b8dff3747176d670343617bd373b990cff863a817f6984808ab2f5ff4c86
-
Filesize
13KB
MD5fd045a2509f3df7e6e5ec63665106d95
SHA1716b9cd50b5b199f3db67eefdc092612d7aaca17
SHA256776c91ac0b3ea6b9ea5ba4aef016faaa6805ff7ab789710e9fb2245bba8afe0b
SHA51251f652287e7eb46793490db7245c59c22824412308d82d4605bcf8c2ba7e159bf3328679b5d6f424e385e498721358fac50e2aa6454e256e61354c6c0e1ccc36
-
Filesize
8KB
MD5f3ad07abc5ab9ef590c55f8a5b673ee7
SHA1a76e11fae585ef101cdfc069b32a7d5cd8190b7d
SHA25698bbffda2b793bc41a445a912ec81b2fa2038893e909f4d680ba9ae7fc859086
SHA512940d101f716868aaadd4d57bf8ca8725aadaad71f28a39b8a5603497a22506bff7b3fc788ff77bb06bb033820bbe3d12771f7589eb4ba9cb98af7f1e979a6bc2
-
Filesize
23KB
MD5a30c987c3860b4dcc66605dc7bd3c068
SHA1d2472b6a0010db719e2cbaf7b321ef1c4335cacf
SHA25619e3696982bc50c7191d637a0b922f015aa2a0c8d569c8148bc1750c01671401
SHA512d21532043b62af0f85014cac965f9c0df6f9149c454e68bcfd5697f0768c1c603e5e4ec501dde36b8edc802ee683906597765e3e6e4492582cc1cd399d151ea1