Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:25
Static task
static1
Behavioral task
behavioral1
Sample
ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe
-
Size
72KB
-
MD5
ead8a04c6fa9d84fbe429549d896cebf
-
SHA1
7ef799039c69b06260450b61afb85c2b6fac3875
-
SHA256
83f31fefe0d543f07677461f111b295cf993df1cb6035449683817369f4f8035
-
SHA512
cdaf865b8579e0e07732627a4ab2402ae38ca2e6e2a233ac338ca6e08e96953f4755936ca6fa226879a27a9be76f1037dd53829fb7b13b81d57c5f51ff84a866
-
SSDEEP
768:N92kt3Yyz3y1Rf1s1No3jW/XHe5PjjaIwhEkhoILv+CqwCqbcsa6s:Dl3YyzCnioT8XHQPqukhEwC6c0s
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1772 asd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\asd = "C:\\Windows\\asd.exe" reg.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\trojan.ini ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe File created C:\Windows\asd.tmp ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe File created C:\Windows\asd.tmp2 ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe File created C:\Windows\asd.exe xcopy.exe File opened for modification C:\Windows\asd.exe xcopy.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2968 reg.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3980 wrote to memory of 1692 3980 ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe 82 PID 3980 wrote to memory of 1692 3980 ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe 82 PID 3980 wrote to memory of 1692 3980 ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe 82 PID 3980 wrote to memory of 2068 3980 ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe 83 PID 3980 wrote to memory of 2068 3980 ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe 83 PID 3980 wrote to memory of 2068 3980 ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe 83 PID 2068 wrote to memory of 2968 2068 cmd.exe 86 PID 2068 wrote to memory of 2968 2068 cmd.exe 86 PID 2068 wrote to memory of 2968 2068 cmd.exe 86 PID 1692 wrote to memory of 5060 1692 cmd.exe 87 PID 1692 wrote to memory of 5060 1692 cmd.exe 87 PID 1692 wrote to memory of 5060 1692 cmd.exe 87 PID 3980 wrote to memory of 1772 3980 ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe 93 PID 3980 wrote to memory of 1772 3980 ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe 93 PID 3980 wrote to memory of 1772 3980 ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ead8a04c6fa9d84fbe429549d896cebf_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.execmd /C xcopy %windir%\*.tmp2 %windir%\*.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\xcopy.exexcopy C:\Windows\*.tmp2 C:\Windows\*.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD HKLM\software\microsoft\windows\currentversion\run /v asd /d %windir%\asd.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\software\microsoft\windows\currentversion\run /v asd /d C:\Windows\asd.exe /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2968
-
-
-
C:\Windows\asd.exeC:\Windows\asd.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD51bffc864682f4d45255835a91465b915
SHA1d9eb4c84cfba7acc2197215b46dabc6671338d14
SHA256bd752a57d757dfb398b065ce2e2953f4a202a2cd826f3cf898e34dd80adec4a1
SHA512476fa61e44d4f313a790b2d518d177ff5f3cc3a32f100c1ec8a5ce9f7316e7cdb46e7b4017aa35904a9d22a6168404d500b1dfe1cb6e4c09e56eecfe55414ca8
-
Filesize
105B
MD53ce9339fdb6a6a27ecbc859165492b4a
SHA1cd19857bc3a28f643c2fb469daaf7cb9f63730a0
SHA2563473097f3b48f2ba70109c325cd8149ad56011b12025aad15cd904d08266c1e8
SHA5121bc6069859d3871a869af18f6be1c53a467937c7ae4ccaa4ca6b1be1bb49c9cf09b73d4455235f9f97cf27e165b58c01171fd52369c0438e1c4e9276bd3c494e