Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 16:32
Static task
static1
Behavioral task
behavioral1
Sample
edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe
-
Size
212KB
-
MD5
edfdef59f92fee006518e57f2f8f01b8
-
SHA1
3b8065cd942b517b402af0cc93f41c0dfdd5dd15
-
SHA256
ae5169a9295d294594533c5cce04ff557eddeea30963e2eb81f5df6cdb6304cd
-
SHA512
f3b78c90f28047c6a8ac97a25fce50a002b718b451eb5c66edf39cd4a510dd3d95f652a1839b3c41d07033e00ca6d76ec41d2b6b01532430c6d80cbfbd62ff07
-
SSDEEP
3072:3d09mZ3vD7RpNh8xvv5z2LizudUfgF8qNO5GM5aEADQbkt/KyJh045Fmxb5k6Toc:3d09mVr7RLh8p5z2OCdULWvDTJle98c
Malware Config
Extracted
tofsee
94.75.255.140
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
pid Process 2544 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2684 jimhq.exe 1968 jimhq.exe -
Loads dropped DLL 3 IoCs
pid Process 2380 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 2380 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 2684 jimhq.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\jimhq.exe\" /r" edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2068 set thread context of 2380 2068 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 30 PID 2684 set thread context of 1968 2684 jimhq.exe 32 PID 1968 set thread context of 2564 1968 jimhq.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jimhq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jimhq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2380 2068 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2380 2068 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2380 2068 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2380 2068 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2380 2068 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2380 2068 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2380 2068 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2380 2068 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2380 2068 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2684 2380 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2684 2380 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2684 2380 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2684 2380 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 31 PID 2684 wrote to memory of 1968 2684 jimhq.exe 32 PID 2684 wrote to memory of 1968 2684 jimhq.exe 32 PID 2684 wrote to memory of 1968 2684 jimhq.exe 32 PID 2684 wrote to memory of 1968 2684 jimhq.exe 32 PID 2684 wrote to memory of 1968 2684 jimhq.exe 32 PID 2684 wrote to memory of 1968 2684 jimhq.exe 32 PID 2684 wrote to memory of 1968 2684 jimhq.exe 32 PID 2684 wrote to memory of 1968 2684 jimhq.exe 32 PID 2684 wrote to memory of 1968 2684 jimhq.exe 32 PID 2380 wrote to memory of 2544 2380 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 33 PID 2380 wrote to memory of 2544 2380 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 33 PID 2380 wrote to memory of 2544 2380 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 33 PID 2380 wrote to memory of 2544 2380 edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe 33 PID 1968 wrote to memory of 2564 1968 jimhq.exe 34 PID 1968 wrote to memory of 2564 1968 jimhq.exe 34 PID 1968 wrote to memory of 2564 1968 jimhq.exe 34 PID 1968 wrote to memory of 2564 1968 jimhq.exe 34 PID 1968 wrote to memory of 2564 1968 jimhq.exe 34 PID 1968 wrote to memory of 2564 1968 jimhq.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edfdef59f92fee006518e57f2f8f01b8_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\jimhq.exe"C:\Users\Admin\jimhq.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\jimhq.exe"C:\Users\Admin\jimhq.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6138.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD58e1385d471972c513b646b1afe8b9f04
SHA16777cb18728eccc0fea95f85923690acc5ba7ad7
SHA25648f71c9f5df68a300d6dcffbfbf06eefc0c7cdaadddfcaf6b49c1a7bcff50749
SHA512389044bf2e4762a0d1db821e66e2c77f8451c52050111df8bac7621c0c19b01778df1192c662c6cf03c6f9b8a7311b43551e7dff16997b8e6f4cf2a0060e4b1f
-
Filesize
212KB
MD5edfdef59f92fee006518e57f2f8f01b8
SHA13b8065cd942b517b402af0cc93f41c0dfdd5dd15
SHA256ae5169a9295d294594533c5cce04ff557eddeea30963e2eb81f5df6cdb6304cd
SHA512f3b78c90f28047c6a8ac97a25fce50a002b718b451eb5c66edf39cd4a510dd3d95f652a1839b3c41d07033e00ca6d76ec41d2b6b01532430c6d80cbfbd62ff07