Analysis
-
max time kernel
121s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe
-
Size
38KB
-
MD5
eeb5a12487d53c0f25d69c0dc4f74058
-
SHA1
a7cd19acb5507e01ef44ebadea5536d13c0daf5b
-
SHA256
5bd321e92d2fc9cb3cc34c9544e5a59956f0337718e08d3874cce08dabe69c2e
-
SHA512
77e506c4c95ae2bc1966fcf172589616b3c3b50d13fb8f66f146db5a85d5e4fb441860cb70a832a7ef16b9b58d62dff9196453f3d9dd639070df8d11159f2c71
-
SSDEEP
768:EoGBwgQ9xh7miRJsKue84EZ43eX/rUI/w9bbVAAtFPoIlan81:EoGBwgc7miL85ZGWQIohZAAfm81
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2560 BCSSync.exe 2128 BCSSync.exe -
Loads dropped DLL 3 IoCs
pid Process 1904 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 1904 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 2560 BCSSync.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1640 set thread context of 1904 1640 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 30 PID 2560 set thread context of 2128 2560 BCSSync.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\I6tE6iAH.com eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1904 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 2128 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1904 1640 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1904 1640 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1904 1640 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1904 1640 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1904 1640 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1904 1640 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1904 1640 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1904 1640 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1904 1640 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 30 PID 1904 wrote to memory of 2560 1904 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 31 PID 1904 wrote to memory of 2560 1904 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 31 PID 1904 wrote to memory of 2560 1904 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 31 PID 1904 wrote to memory of 2560 1904 eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2128 2560 BCSSync.exe 32 PID 2560 wrote to memory of 2128 2560 BCSSync.exe 32 PID 2560 wrote to memory of 2128 2560 BCSSync.exe 32 PID 2560 wrote to memory of 2128 2560 BCSSync.exe 32 PID 2560 wrote to memory of 2128 2560 BCSSync.exe 32 PID 2560 wrote to memory of 2128 2560 BCSSync.exe 32 PID 2560 wrote to memory of 2128 2560 BCSSync.exe 32 PID 2560 wrote to memory of 2128 2560 BCSSync.exe 32 PID 2560 wrote to memory of 2128 2560 BCSSync.exe 32 PID 2128 wrote to memory of 2680 2128 BCSSync.exe 34 PID 2128 wrote to memory of 2680 2128 BCSSync.exe 34 PID 2128 wrote to memory of 2680 2128 BCSSync.exe 34 PID 2128 wrote to memory of 2680 2128 BCSSync.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\eeb5a12487d53c0f25d69c0dc4f74058_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5f7446b27c554c4cefde1e6f1d2d4b2d7
SHA1278746cc5d0e88612bd71d4ba8ddea30bbd5d3c2
SHA25695bb4d39dbb6522266ec9e5172e276bd7456afbe58ce9bb728d1bade7c3ab23e
SHA5124b09cbb0d947df948258192124d55968cb064347053375141baa808c512b1a7ce7e76933035c5cca97ab668e6c4a8f691942d571f548634c919465421b4a84c2