Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe
-
Size
645KB
-
MD5
f99ee4e168b83292fbfb1d1ef2929b11
-
SHA1
3ea7cd3f3093926375ded5f9844b8c5cc0b13c87
-
SHA256
f1255911bc4e842df16b971944c19ddb04e3eed04923340a67d27bd23f8c48b5
-
SHA512
ecad07c5e3c7589a9e7dd8e1d97139d85f84ff699cba8ad4eb51280e6297494798584968766c31d6df22d4e425c0d87bc2fad884dd44b8dcc7d7efaeafe26618
-
SSDEEP
12288:ErwFv3EBw+bEAAECYPDKWobWBka2ZF3Z4mxx8W7EFBBm8skNMSM3wFWjh:ErwN39aW8PdoOoQmX8vB8+29iWjh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4972 svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svchost.exe f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe File opened for modification C:\Windows\svchost.exe f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe File created C:\Windows\uninstal.bat f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4952 f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe Token: SeDebugPrivilege 4972 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4972 svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4804 4952 f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe 83 PID 4952 wrote to memory of 4804 4952 f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe 83 PID 4952 wrote to memory of 4804 4952 f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe 83 PID 4972 wrote to memory of 4512 4972 svchost.exe 84 PID 4972 wrote to memory of 4512 4972 svchost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f99ee4e168b83292fbfb1d1ef2929b11_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat2⤵
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
645KB
MD5f99ee4e168b83292fbfb1d1ef2929b11
SHA13ea7cd3f3093926375ded5f9844b8c5cc0b13c87
SHA256f1255911bc4e842df16b971944c19ddb04e3eed04923340a67d27bd23f8c48b5
SHA512ecad07c5e3c7589a9e7dd8e1d97139d85f84ff699cba8ad4eb51280e6297494798584968766c31d6df22d4e425c0d87bc2fad884dd44b8dcc7d7efaeafe26618
-
Filesize
218B
MD5fdfec509e98bfdf601bf89c30a3f6312
SHA19467e5204c035eeec671a05f89968d1e6bdf3a48
SHA256bfc68de5bc4a59b367f2f02c6cbb0ad19b0f0c23fd6d49cdf8abd77a3b732115
SHA51271d12ad2222f74102a856ce2870b0053c38998463238debc8dd97e0d9ee423edeb9615792fbfff8aaf56d85ceeac0460f3b2a01329714889a08be3f72d2517d3