Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe
-
Size
164KB
-
MD5
ff7696dfda0ccd0c88f5b9083f87f034
-
SHA1
0e5566e885b9f7a2a90dfa574f47fa6025a7d580
-
SHA256
839f289337dbbcb572d6d6f215103465aa72c4ace65b826ca54a5dfbab024137
-
SHA512
7032b6fd900f55a7351d9359d0e3912dd6ad2f50c72222208831cce8beb67d4ff5b3490072d0c5e58aca204dde87d6335671999b2857c128d23570508869d892
-
SSDEEP
3072:L1Z9EvxJHffkpWt8np0BaD3y2W95BOCPs1PV7d4u7+c36z7tX:eNKOqEbG1PV7vVM7tX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\332ED\\0F354.exe" ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/220-3-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3344-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3344-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3344-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/220-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/220-18-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4304-116-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/220-117-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/220-307-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 220 wrote to memory of 3344 220 ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe 82 PID 220 wrote to memory of 3344 220 ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe 82 PID 220 wrote to memory of 3344 220 ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe 82 PID 220 wrote to memory of 4304 220 ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe 87 PID 220 wrote to memory of 4304 220 ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe 87 PID 220 wrote to memory of 4304 220 ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe startC:\Program Files (x86)\LP\5453\B33.exe%C:\Program Files (x86)\LP\54532⤵PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ff7696dfda0ccd0c88f5b9083f87f034_JaffaCakes118.exe startC:\Program Files (x86)\ED982\lvvm.exe%C:\Program Files (x86)\ED9822⤵PID:4304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5ebdf11f24363c3d0fdd9f6f99ec14284
SHA1a5489bdb492e3b0f6c1125a6d99a94b894e75b97
SHA2569558ec3e2ad273cb43c25d2c65055eea434a49676f7c5b4f88c6973c4c26cd9c
SHA512ac4e2dd89fe23da2f7b2c4ce91efb17fe476ab7734a639af9b193e4dd972f74a51ce27f6b55c077560ce52bfafea03d6020b9801a9c087e6e0ec4f099ffca90b
-
Filesize
996B
MD5593bc92ad828c4c1c478a7455a5e2aee
SHA1226b35a5400ca1e32a5dee5ca65b1089c3a246fb
SHA2569965a7c09e35af65a73746f357ff4f8cb68f1de85ec1d9621104df50a0ebbd01
SHA51219c774d52ad6a593e3fb0d69b03de084f0200309ab699a5a4610c240a3dc807a4697da75b9edd20c8edd3980b3795765ac59d0c900a401e70b309cf4cfc633db
-
Filesize
1KB
MD5313e5a3330e5ca71806847f3c6f6bfe9
SHA1ca1999a787c854177359944f464f17c0a15d09b9
SHA2565c9cee4aff8bf5c28ff308ed989cf686b33ae4a897df7fb67be5e12a59aed03c
SHA5122239de8f9889ccbd3913dbbbea0cb4c8e79a9cd97f309512f5078fb36d636021f690ed5a88e379af39c351216b785ff4bd60cd7c89aefa07d5426a54d4955640