Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe
-
Size
127KB
-
MD5
edca1cffd1ff2bdfc57153a3205fee28
-
SHA1
79563ea503b604223667265df8c7990d46c9f09a
-
SHA256
1cd3f805bba564c28d16e4295e7be6fe6ca7f4737127dd3c77e944de798e2933
-
SHA512
b418cf6c085e549765bc71448a4351300ebe94cf27b499f8f77baf0e14f4d334ea3e3670651a08151cd5ed08d851c933dbf713829dab78ba0dbaeaa839619232
-
SSDEEP
3072:SvBkbFPqDSJ/mGPcp/Tvq/r+JYq/78bw/JNtWG:+03qjQ+JYq/gcIG
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\System\uname.exe = "C:\\Program Files (x86)\\Common Files\\System\\uname.exe:*:Enabled:Windows Update" uname.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 uname.exe -
Loads dropped DLL 2 IoCs
pid Process 2676 edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe 2676 edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Program Files (x86)\\Common Files\\System\\uname.exe" uname.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\System\uname.exe edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\System\uname.exe edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\System uname.exe File created C:\Program Files (x86)\Common Files\System\uname.exe uname.exe File opened for modification C:\Program Files (x86)\Common Files\System\uname.exe uname.exe File opened for modification C:\Program Files (x86)\Common Files\System edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uname.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2620 2676 edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2620 2676 edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2620 2676 edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2620 2676 edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edca1cffd1ff2bdfc57153a3205fee28_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Common Files\System\uname.exe"C:\Program Files (x86)\Common Files\System\uname.exe"2⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD5edca1cffd1ff2bdfc57153a3205fee28
SHA179563ea503b604223667265df8c7990d46c9f09a
SHA2561cd3f805bba564c28d16e4295e7be6fe6ca7f4737127dd3c77e944de798e2933
SHA512b418cf6c085e549765bc71448a4351300ebe94cf27b499f8f77baf0e14f4d334ea3e3670651a08151cd5ed08d851c933dbf713829dab78ba0dbaeaa839619232