Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 11:15
Static task
static1
Behavioral task
behavioral1
Sample
f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe
-
Size
996KB
-
MD5
f5e2adb6d79eb7bb634f9eed33ff754c
-
SHA1
ae8761b0c155588eca69d58def8e46d2a1060f91
-
SHA256
1e2623c17e4955fae07c6763e1b23f3b1d01a4aaac06d307042f29be8ec5cecc
-
SHA512
e58c7daca2133292f5b6b672630c3a6fdf1ea7a5dfaee3fe71736e94cd14edb1408970ad700ee6a9b04494be659230a48abda9a0c9671440eb60389ed7287506
-
SSDEEP
12288:G+ThrE567NIZN5BUIrzJY6Et+3kI7dC3X64P7r9r/+pppppppppppppppppppppt:G4JccI5BUcfEY7hO1qd0B3n1TSZrnBX
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4748 erebf.exe 1956 erebf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pouxax = "C:\\Users\\Admin\\AppData\\Roaming\\Cedef\\erebf.exe" erebf.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1360 set thread context of 4908 1360 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 89 PID 4748 set thread context of 1956 4748 erebf.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erebf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erebf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe 1956 erebf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 4908 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe Token: SeSecurityPrivilege 4908 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4908 1360 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 89 PID 1360 wrote to memory of 4908 1360 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 89 PID 1360 wrote to memory of 4908 1360 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 89 PID 1360 wrote to memory of 4908 1360 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 89 PID 1360 wrote to memory of 4908 1360 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 89 PID 1360 wrote to memory of 4908 1360 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 89 PID 1360 wrote to memory of 4908 1360 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 89 PID 1360 wrote to memory of 4908 1360 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 89 PID 4908 wrote to memory of 4748 4908 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 90 PID 4908 wrote to memory of 4748 4908 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 90 PID 4908 wrote to memory of 4748 4908 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 90 PID 4748 wrote to memory of 1956 4748 erebf.exe 93 PID 4748 wrote to memory of 1956 4748 erebf.exe 93 PID 4748 wrote to memory of 1956 4748 erebf.exe 93 PID 4748 wrote to memory of 1956 4748 erebf.exe 93 PID 4748 wrote to memory of 1956 4748 erebf.exe 93 PID 4748 wrote to memory of 1956 4748 erebf.exe 93 PID 4748 wrote to memory of 1956 4748 erebf.exe 93 PID 4748 wrote to memory of 1956 4748 erebf.exe 93 PID 4908 wrote to memory of 4016 4908 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 94 PID 4908 wrote to memory of 4016 4908 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 94 PID 4908 wrote to memory of 4016 4908 f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe 94 PID 1956 wrote to memory of 2996 1956 erebf.exe 50 PID 1956 wrote to memory of 2996 1956 erebf.exe 50 PID 1956 wrote to memory of 2996 1956 erebf.exe 50 PID 1956 wrote to memory of 2996 1956 erebf.exe 50 PID 1956 wrote to memory of 2996 1956 erebf.exe 50 PID 1956 wrote to memory of 3028 1956 erebf.exe 51 PID 1956 wrote to memory of 3028 1956 erebf.exe 51 PID 1956 wrote to memory of 3028 1956 erebf.exe 51 PID 1956 wrote to memory of 3028 1956 erebf.exe 51 PID 1956 wrote to memory of 3028 1956 erebf.exe 51 PID 1956 wrote to memory of 408 1956 erebf.exe 52 PID 1956 wrote to memory of 408 1956 erebf.exe 52 PID 1956 wrote to memory of 408 1956 erebf.exe 52 PID 1956 wrote to memory of 408 1956 erebf.exe 52 PID 1956 wrote to memory of 408 1956 erebf.exe 52 PID 1956 wrote to memory of 3476 1956 erebf.exe 56 PID 1956 wrote to memory of 3476 1956 erebf.exe 56 PID 1956 wrote to memory of 3476 1956 erebf.exe 56 PID 1956 wrote to memory of 3476 1956 erebf.exe 56 PID 1956 wrote to memory of 3476 1956 erebf.exe 56 PID 1956 wrote to memory of 3568 1956 erebf.exe 57 PID 1956 wrote to memory of 3568 1956 erebf.exe 57 PID 1956 wrote to memory of 3568 1956 erebf.exe 57 PID 1956 wrote to memory of 3568 1956 erebf.exe 57 PID 1956 wrote to memory of 3568 1956 erebf.exe 57 PID 1956 wrote to memory of 3776 1956 erebf.exe 58 PID 1956 wrote to memory of 3776 1956 erebf.exe 58 PID 1956 wrote to memory of 3776 1956 erebf.exe 58 PID 1956 wrote to memory of 3776 1956 erebf.exe 58 PID 1956 wrote to memory of 3776 1956 erebf.exe 58 PID 1956 wrote to memory of 3868 1956 erebf.exe 59 PID 1956 wrote to memory of 3868 1956 erebf.exe 59 PID 1956 wrote to memory of 3868 1956 erebf.exe 59 PID 1956 wrote to memory of 3868 1956 erebf.exe 59 PID 1956 wrote to memory of 3868 1956 erebf.exe 59 PID 1956 wrote to memory of 3928 1956 erebf.exe 60 PID 1956 wrote to memory of 3928 1956 erebf.exe 60 PID 1956 wrote to memory of 3928 1956 erebf.exe 60 PID 1956 wrote to memory of 3928 1956 erebf.exe 60 PID 1956 wrote to memory of 3928 1956 erebf.exe 60 PID 1956 wrote to memory of 4020 1956 erebf.exe 61 PID 1956 wrote to memory of 4020 1956 erebf.exe 61
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3028
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:408
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5e2adb6d79eb7bb634f9eed33ff754c_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Roaming\Cedef\erebf.exe"C:\Users\Admin\AppData\Roaming\Cedef\erebf.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Roaming\Cedef\erebf.exe"C:\Users\Admin\AppData\Roaming\Cedef\erebf.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpbc417b49.bat"4⤵
- System Location Discovery: System Language Discovery
PID:4016 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3668
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3776
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3868
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3928
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4020
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4104
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:3976
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5a95b1d734f7ed7e1572ae15c5dd82cd6
SHA12f60eb3ef9e3a63b12f474fee52099618d81d8d1
SHA2569688a59a41053cb3eea773c46717f3fe7e75e2b1d4de8fec7ac0a99e42565411
SHA5124bf921f85d2810305be5b21c17fc5f7a176b3df27aab291490b3d1c9486b5098b0b7ae6639fba0406072eac2969e836ad532b1c0939eae680fa5d2e9b24cce90
-
Filesize
996KB
MD5774740543413449d8145b9d5c0f3f60f
SHA124e1e0766610d8633322b5475df08d3f6227f827
SHA2567680532d2b8a336be6fd80d595f63601de460b6df86422b9d339770149783618
SHA5127b760795610932641b8b971dc085482629a3ab69a7fabe4a838aa363860356464dfc591db104eab6d2159b8bca5a0c335052c75ef44550f2a8b90c06d73e414d