Analysis
-
max time kernel
140s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe
-
Size
531KB
-
MD5
ecd225883d7d08889c557de09a3f7421
-
SHA1
cb7ab11bdeaf4387b5e3d3e0785c1a0a8e8213ca
-
SHA256
72d15d14ebd4ab4c6df841e6c1cf19a8b7cd90d41161dd78bd5af84196d3c7b8
-
SHA512
4b92c774c48f5215a3ba4a7571dc1ab7a57a85984b6c16a4f60d6d35901a89b42b436cf2e8a36e4623c7b06f352aadc4f790dbd4f934804da268a2239c669150
-
SSDEEP
12288:G93Wr+LO1WiZWU0di4dBeF3Z4mxxaoEtlK+kt9T2MryYEJL7:GlWr+LTiZWUkiQeQmXzGuyY+L7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\miTao2.exe" miTao2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation miTao2.exe -
Deletes itself 1 IoCs
pid Process 3432 exeA2A8.tmp -
Executes dropped EXE 2 IoCs
pid Process 2584 miTao2.exe 3432 exeA2A8.tmp -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\miTao2.exe ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe File created C:\Windows\miTao2.exe ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe File opened for modification C:\Windows\miTao2.exe miTao2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exeA2A8.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miTao2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe 2584 miTao2.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5032 wrote to memory of 2584 5032 ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe 82 PID 5032 wrote to memory of 2584 5032 ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe 82 PID 5032 wrote to memory of 2584 5032 ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe 82 PID 5032 wrote to memory of 3432 5032 ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe 83 PID 5032 wrote to memory of 3432 5032 ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe 83 PID 5032 wrote to memory of 3432 5032 ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe 83 PID 2584 wrote to memory of 4444 2584 miTao2.exe 84 PID 2584 wrote to memory of 4444 2584 miTao2.exe 84 PID 2584 wrote to memory of 4444 2584 miTao2.exe 84 PID 4444 wrote to memory of 4624 4444 cmd.exe 86 PID 4444 wrote to memory of 4624 4444 cmd.exe 86 PID 4444 wrote to memory of 4624 4444 cmd.exe 86 PID 4624 wrote to memory of 3064 4624 net.exe 87 PID 4624 wrote to memory of 3064 4624 net.exe 87 PID 4624 wrote to memory of 3064 4624 net.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecd225883d7d08889c557de09a3f7421_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\miTao2.exeC:\Windows\miTao2.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess5⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\exeA2A8.tmpC:\Users\Admin\AppData\Local\Temp\exeA2A8.tmp 604 C:\Users\Admin\AppData\Local\Temp\ECD225~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD5ecd225883d7d08889c557de09a3f7421
SHA1cb7ab11bdeaf4387b5e3d3e0785c1a0a8e8213ca
SHA25672d15d14ebd4ab4c6df841e6c1cf19a8b7cd90d41161dd78bd5af84196d3c7b8
SHA5124b92c774c48f5215a3ba4a7571dc1ab7a57a85984b6c16a4f60d6d35901a89b42b436cf2e8a36e4623c7b06f352aadc4f790dbd4f934804da268a2239c669150