Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:52
Static task
static1
Behavioral task
behavioral1
Sample
eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe
-
Size
68KB
-
MD5
eab46723a03c608e1ffc1794ab7b7605
-
SHA1
478581483ad72631fa111472c6b24c20ae7ccf6c
-
SHA256
9c00f1c034eeaaeaf513fd9d63c7698c7464c3592239973197a4fb5d25502d8f
-
SHA512
b566cc2f3212277d9c12a99afdbb11183691044c12fdbb8d1f8ddc40e903c9295dc9508adc539b92461f864081cd33ed9df102680155bff93db128c48da1fc9b
-
SSDEEP
768:J3LNloe8Fvccfdg18Zg7HT2HbLdAhA/Bcb/ZZR89yExLzb5F0EAj+qneL:J7Mqcfdg+CXMbbNFpFUqqeL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2812 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 tvuigzivsxmlmhn.exe -
Loads dropped DLL 2 IoCs
pid Process 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created \??\c:\program files (x86)\common files\tvuigzivsxmlmhn.exe eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\common files\tvuigzivsxmlmhn.exe eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\tvuigzivsxmlmhn1.exe tvuigzivsxmlmhn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvuigzivsxmlmhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe Token: SeDebugPrivilege 2648 tvuigzivsxmlmhn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe 2648 tvuigzivsxmlmhn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2648 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2648 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2648 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2648 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2812 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2812 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2812 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2812 2200 eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab46723a03c608e1ffc1794ab7b7605_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\program files (x86)\common files\tvuigzivsxmlmhn.exe"C:\program files (x86)\common files\tvuigzivsxmlmhn.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\melt.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251B
MD51f1102ab9bfae6fcb9c9ef8263d93ba7
SHA189e8100adee0d5a537361b90b41dcc90568e870b
SHA256e446a23c89dd70d7fa12be6e99861bf775e839dd75471ac7d2916a26434c7b31
SHA5127415458b264e149b82e4905c6bf1bc984e00e8f77b05cfc0e1f3567b203fbb93c01e9d59a5c1e5f11bd56146b6b15e3cfbe23ffd4b1066530b30987505a37d71
-
Filesize
68KB
MD5eab46723a03c608e1ffc1794ab7b7605
SHA1478581483ad72631fa111472c6b24c20ae7ccf6c
SHA2569c00f1c034eeaaeaf513fd9d63c7698c7464c3592239973197a4fb5d25502d8f
SHA512b566cc2f3212277d9c12a99afdbb11183691044c12fdbb8d1f8ddc40e903c9295dc9508adc539b92461f864081cd33ed9df102680155bff93db128c48da1fc9b