Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe
-
Size
449KB
-
MD5
eb84446224399d6d26dd324d0b31092b
-
SHA1
4bfb1c14561cb9248a37b9998f02ea3939af0d45
-
SHA256
77be131f564e23d42003c5ccb3ba765e2ecc66d28b0087f3d5313cf2814fcf84
-
SHA512
cd1e31e48851026551b73a3c75ea9c21c60e7987881998dbcaa931d91d01e642d42215c1b90c38f3d19590864a26d00e0192357d894c9dd46fa9a56a59cdb9e9
-
SSDEEP
6144:0NF65XrsQF8FfevZRMPhIbHAtLh4IsuZCPHwI4Gdzi81AOLF:0NF65bvCF2zMybHTHwIpdm8RL
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1840 АааССхххХЕtBmc.exe 2052 АааССхххХЕtBoc.exe 2732 АааССхххХЕtBoc.exe -
Loads dropped DLL 2 IoCs
pid Process 1764 eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe 1840 АааССхххХЕtBmc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language АааССхххХЕtBmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language АааССхххХЕtBoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language АааССхххХЕtBoc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2732 АааССхххХЕtBoc.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1840 1764 eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe 30 PID 1764 wrote to memory of 1840 1764 eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe 30 PID 1764 wrote to memory of 1840 1764 eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe 30 PID 1764 wrote to memory of 1840 1764 eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe 30 PID 1840 wrote to memory of 2052 1840 АааССхххХЕtBmc.exe 31 PID 1840 wrote to memory of 2052 1840 АааССхххХЕtBmc.exe 31 PID 1840 wrote to memory of 2052 1840 АааССхххХЕtBmc.exe 31 PID 1840 wrote to memory of 2052 1840 АааССхххХЕtBmc.exe 31 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2052 wrote to memory of 2372 2052 АааССхххХЕtBoc.exe 32 PID 2628 wrote to memory of 2732 2628 taskeng.exe 35 PID 2628 wrote to memory of 2732 2628 taskeng.exe 35 PID 2628 wrote to memory of 2732 2628 taskeng.exe 35 PID 2628 wrote to memory of 2732 2628 taskeng.exe 35 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 PID 2732 wrote to memory of 2332 2732 АааССхххХЕtBoc.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\ProgramData\АааССхххХЕtBmc.exe"C:\ProgramData\АааССхххХЕtBmc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\diskram\АааССхххХЕtBoc.exeC:\Users\Admin\AppData\Roaming\diskram\АааССхххХЕtBoc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:2372
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {87169A6F-759C-4C3C-9F2F-BC2595BF6660} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\diskram\АааССхххХЕtBoc.exeC:\Users\Admin\AppData\Roaming\diskram\АааССхххХЕtBoc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD5eb84446224399d6d26dd324d0b31092b
SHA14bfb1c14561cb9248a37b9998f02ea3939af0d45
SHA25677be131f564e23d42003c5ccb3ba765e2ecc66d28b0087f3d5313cf2814fcf84
SHA512cd1e31e48851026551b73a3c75ea9c21c60e7987881998dbcaa931d91d01e642d42215c1b90c38f3d19590864a26d00e0192357d894c9dd46fa9a56a59cdb9e9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269
Filesize1KB
MD55da3987edabcfcdac3a0c8c861c63bb7
SHA1edda7d4a2f0beafcf47e46e8a37f2dabcf49d4b5
SHA2563b3fa019cbc37b762ec4fb159fa6613c0adccf3fa6e9654d40564362cdfcb3b1
SHA512690b318c5190eb587a9661ac826f86417dd30099cc07cc98c993b7fd154647ad2bb80d57336e5f2ac561a1b77224c745ad6917792d965000aeffe067b0160848