Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 16:16
Static task
static1
Behavioral task
behavioral1
Sample
f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe
-
Size
398KB
-
MD5
f663b28b3da41486c50a76c6fd700c2f
-
SHA1
3bff8a14737a3aac77a88d699ef2b39c700e7e36
-
SHA256
0ad0b58e98b357583efbc5518485c3873cdbe084a2e0d518ab663e1cb5415110
-
SHA512
c6a1e281139c3609e28dd611990214d3a408973989966c337629551fef55608c61612cdc5c93bda01e2c89fc772f7a143112440285c1913ff9b07a211a7e3a81
-
SSDEEP
12288:rmSTEf/oWifPkmPAWoi7jPI/6mV0ySwGbisTrA0Mro:Go/XkiAWo8jPI/AIiZrA0Go
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3272 mHgFjGf01814.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mHgFjGf01814 = "C:\\ProgramData\\mHgFjGf01814\\mHgFjGf01814.exe" mHgFjGf01814.exe -
resource yara_rule behavioral2/memory/1576-2-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3272-13-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1576-16-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral2/memory/1576-17-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3272-19-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3272-27-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mHgFjGf01814.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1576 f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe Token: SeDebugPrivilege 3272 mHgFjGf01814.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3272 mHgFjGf01814.exe 3272 mHgFjGf01814.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3272 mHgFjGf01814.exe 3272 mHgFjGf01814.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3272 mHgFjGf01814.exe 3272 mHgFjGf01814.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1576 wrote to memory of 3272 1576 f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe 82 PID 1576 wrote to memory of 3272 1576 f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe 82 PID 1576 wrote to memory of 3272 1576 f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\ProgramData\mHgFjGf01814\mHgFjGf01814.exe"C:\ProgramData\mHgFjGf01814\mHgFjGf01814.exe" "C:\Users\Admin\AppData\Local\Temp\f663b28b3da41486c50a76c6fd700c2f_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398KB
MD5dff65799a92d6e4d3b95806ae509f5b3
SHA14248da77f9f952b460cac387687bcd6ed132e5b0
SHA25679a3f19293bbeb72cc8a7155aad095d13e702723023f9b8acc88dc6e5c418ed7
SHA5122db77584846db484f6d84b40f6f92f68a0382e5eb02afcea4acfa959a870b4cf85537c23af33b674f092f312d8840c4bd1c6d2c83d8c8ce9f2454a5d9877986b