Analysis
-
max time kernel
148s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe
-
Size
31KB
-
MD5
fbddb8559054a8e04e81cedc75adcdd5
-
SHA1
f3ee535ce7ae53ec2534989fe39013cde557696b
-
SHA256
f71a215f548d1ecaab5b39d30d6cd8a2db4f6ecf0377834df9e411053d3eec19
-
SHA512
45a8e04ccbaea72cbe576f9a3ada315d86d524a4169af9c2d7ba48eb0d4fdfb8e1a064dcdbae188de4b3aa5e018a8a9d41fb0c883114e718655924a30473d4f6
-
SSDEEP
384:hRhvdel8ct1PDcOQDgNRjhnk9Ac4uIw/2XwpHIAZ8wUizXctDXkBocJRUDGGjohZ:belpD4OJflLFuI9nATmDXkUM/4Y
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2852 service.exe 2780 service.exe -
Loads dropped DLL 3 IoCs
pid Process 3028 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 3028 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 2852 service.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\service.exe" fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "service.exe" fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\service.exe" service.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2052 set thread context of 3028 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 29 PID 2852 set thread context of 2780 2852 service.exe 31 -
resource yara_rule behavioral1/memory/3028-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3028-9-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3028-10-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3028-6-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3028-11-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-33-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-34-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3028-36-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-38-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-40-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-41-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-42-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-43-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-44-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-45-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-46-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-47-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-48-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-49-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-50-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-51-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-52-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 2852 service.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2052 wrote to memory of 3028 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 29 PID 2052 wrote to memory of 3028 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 29 PID 2052 wrote to memory of 3028 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 29 PID 2052 wrote to memory of 3028 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 29 PID 2052 wrote to memory of 3028 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 29 PID 2052 wrote to memory of 3028 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 29 PID 2052 wrote to memory of 3028 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 29 PID 2052 wrote to memory of 3028 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 29 PID 2052 wrote to memory of 3028 2052 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 29 PID 3028 wrote to memory of 2852 3028 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2852 3028 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2852 3028 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2852 3028 fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2780 2852 service.exe 31 PID 2852 wrote to memory of 2780 2852 service.exe 31 PID 2852 wrote to memory of 2780 2852 service.exe 31 PID 2852 wrote to memory of 2780 2852 service.exe 31 PID 2852 wrote to memory of 2780 2852 service.exe 31 PID 2852 wrote to memory of 2780 2852 service.exe 31 PID 2852 wrote to memory of 2780 2852 service.exe 31 PID 2852 wrote to memory of 2780 2852 service.exe 31 PID 2852 wrote to memory of 2780 2852 service.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fbddb8559054a8e04e81cedc75adcdd5_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\service.exeC:\Users\Admin\AppData\Local\Temp\service.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5fbddb8559054a8e04e81cedc75adcdd5
SHA1f3ee535ce7ae53ec2534989fe39013cde557696b
SHA256f71a215f548d1ecaab5b39d30d6cd8a2db4f6ecf0377834df9e411053d3eec19
SHA51245a8e04ccbaea72cbe576f9a3ada315d86d524a4169af9c2d7ba48eb0d4fdfb8e1a064dcdbae188de4b3aa5e018a8a9d41fb0c883114e718655924a30473d4f6