Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe
-
Size
338KB
-
MD5
fc05aabf2e7f2a8def55bb30f17777d3
-
SHA1
8e1e76ccb9dca23e859e3f7c4aaceb5fca8e396f
-
SHA256
2eb23f14c0f329524dfb40cdea6ff6f10827b9c9719d69a0a8aaf205e79b1632
-
SHA512
5c4745b3536420eb0a48bb2f2e3d3def87d0ff481847565a5c6d15446863a0267e1fbc0a86c0ce6047b288ecda2e0acc43aa403b42ff195781839ea92d0ae051
-
SSDEEP
6144:H4Sv6p9J13jkO4YhRMt+ejxAVtqdbkAhXrC81ORi/JvgRw:H4QM13jkO4mMceje3qdQAptL4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1744 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 cszti.exe -
Loads dropped DLL 3 IoCs
pid Process 1744 cmd.exe 1744 cmd.exe 2820 cszti.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cszti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1744 cmd.exe 2732 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 2784 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2732 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2860 wrote to memory of 1744 2860 fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe 31 PID 2860 wrote to memory of 1744 2860 fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe 31 PID 2860 wrote to memory of 1744 2860 fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe 31 PID 2860 wrote to memory of 1744 2860 fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe 31 PID 1744 wrote to memory of 2784 1744 cmd.exe 33 PID 1744 wrote to memory of 2784 1744 cmd.exe 33 PID 1744 wrote to memory of 2784 1744 cmd.exe 33 PID 1744 wrote to memory of 2784 1744 cmd.exe 33 PID 1744 wrote to memory of 2732 1744 cmd.exe 35 PID 1744 wrote to memory of 2732 1744 cmd.exe 35 PID 1744 wrote to memory of 2732 1744 cmd.exe 35 PID 1744 wrote to memory of 2732 1744 cmd.exe 35 PID 1744 wrote to memory of 2820 1744 cmd.exe 36 PID 1744 wrote to memory of 2820 1744 cmd.exe 36 PID 1744 wrote to memory of 2820 1744 cmd.exe 36 PID 1744 wrote to memory of 2820 1744 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2860 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\fc05aabf2e7f2a8def55bb30f17777d3_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\cszti.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 28603⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2732
-
-
C:\Users\Admin\AppData\Local\cszti.exeC:\Users\Admin\AppData\Local\cszti.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD5fc05aabf2e7f2a8def55bb30f17777d3
SHA18e1e76ccb9dca23e859e3f7c4aaceb5fca8e396f
SHA2562eb23f14c0f329524dfb40cdea6ff6f10827b9c9719d69a0a8aaf205e79b1632
SHA5125c4745b3536420eb0a48bb2f2e3d3def87d0ff481847565a5c6d15446863a0267e1fbc0a86c0ce6047b288ecda2e0acc43aa403b42ff195781839ea92d0ae051