Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe
-
Size
36KB
-
MD5
eac7abba08b0aaf1fc023206d87a1cca
-
SHA1
a2f7da758cd02609dff4421e8e3517436905cbfe
-
SHA256
a4da95f01c1260c180c5a498cf5bc29f04d3e04fe7f6319d57627a31299a712b
-
SHA512
4bc57d37150ebe6f238de8eeb3b7803a082736f923e27eee115a1af00dc56e370c25ff4fc81e7da181d55658fe8c087a097c782525babf3236b8461a224fa091
-
SSDEEP
768:L5uhMogHxJ5CVpm6jFHd+mc+8MfIsVNwDhqpsqx:9FoglCVBjdqz9Nwpp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2620 BCSSync.exe 2856 BCSSync.exe -
Loads dropped DLL 2 IoCs
pid Process 2200 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 2200 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2236 set thread context of 2200 2236 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 30 PID 2620 set thread context of 2856 2620 BCSSync.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\6K73od4G7.com eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync .exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2200 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 2856 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2200 2236 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2200 2236 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2200 2236 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2200 2236 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2200 2236 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2200 2236 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2200 2236 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2200 2236 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2200 2236 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2620 2200 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2620 2200 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2620 2200 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2620 2200 eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe 31 PID 2620 wrote to memory of 2856 2620 BCSSync.exe 32 PID 2620 wrote to memory of 2856 2620 BCSSync.exe 32 PID 2620 wrote to memory of 2856 2620 BCSSync.exe 32 PID 2620 wrote to memory of 2856 2620 BCSSync.exe 32 PID 2620 wrote to memory of 2856 2620 BCSSync.exe 32 PID 2620 wrote to memory of 2856 2620 BCSSync.exe 32 PID 2620 wrote to memory of 2856 2620 BCSSync.exe 32 PID 2620 wrote to memory of 2856 2620 BCSSync.exe 32 PID 2620 wrote to memory of 2856 2620 BCSSync.exe 32 PID 2856 wrote to memory of 2924 2856 BCSSync.exe 33 PID 2856 wrote to memory of 2924 2856 BCSSync.exe 33 PID 2856 wrote to memory of 2924 2856 BCSSync.exe 33 PID 2856 wrote to memory of 2924 2856 BCSSync.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5ef04538e9e756b54b294d65739c2d836
SHA1331702fb667f097f52863b8fa90b859c1a9fb6d6
SHA25670b752b7066e72237a7a6d847f8f2b27b5a40fe6ed1650ee114ebf848672e2cf
SHA5121c2973d499ab61fbb3f18cd8460686132faf0fcdd963f1b41f2b1b79bf3344ab6176968b57d4ab495e990aa13f6d3de72c77e67e59aa7ebce561eb9e0a3dce4f