Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe
-
Size
88KB
-
MD5
ef22720e85b6cf7c598e251c9f6e95e9
-
SHA1
10e3b1e81f479b46ffb84f0c3349540aed1a37af
-
SHA256
a756cf621552061a7b823eab4d5d406ff84119dcaa2802a66719ace79388f140
-
SHA512
473021d0a2cdceaf00473f12082c34c23306325135283acec9f48ce760fcafe8d30dab9933eb6a38c1db1e8e9efb1264d3854cd485661078b63f69229f6869ce
-
SSDEEP
1536:b32/CwuanMqM3doN0zF2CsaXsZPhGC6o5anMqM3GZV/9x:bgypR3r1sTFpR3wn
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Angel2.exe ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Angel2.exe ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\critonc = "C:\\windows\\kalargent.exe" ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\kalargent.exe ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe File opened for modification C:\Windows\kalargent.exe ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2316 ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef22720e85b6cf7c598e251c9f6e95e9_JaffaCakes118.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\S-1-5-21-1846800975-3917212583-2893086201-1000.exe
Filesize88KB
MD5ef22720e85b6cf7c598e251c9f6e95e9
SHA110e3b1e81f479b46ffb84f0c3349540aed1a37af
SHA256a756cf621552061a7b823eab4d5d406ff84119dcaa2802a66719ace79388f140
SHA512473021d0a2cdceaf00473f12082c34c23306325135283acec9f48ce760fcafe8d30dab9933eb6a38c1db1e8e9efb1264d3854cd485661078b63f69229f6869ce