Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe
-
Size
712KB
-
MD5
fe16a136c5f2c6dbfdc19e5aece87361
-
SHA1
c960ae548ae499d0b9df3279095984c64c3e4111
-
SHA256
42ba4a13429b26693044eded719292f50e50e9749cc8e1cfb268c6d0b9fd9e1c
-
SHA512
33de335eeec2e67616a2466adadefe5f7d1ece12f511a0c4fc479a1a194a05393975b25fd3662d7033d9418845cfdd6f111e2f002dfd4f2d3949d57372aef78f
-
SSDEEP
12288:W6qx+GgJOpEheBWpJ0NjYZZRKFdCFqPryQ32E9i/4B:8QlmWpJGYZZ4FsFEpn
Malware Config
Extracted
amadey
1.99
217.8.117.41/nbDcw2d/index.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4984 bdif.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created \??\c:\programdata\44def37582\bdif.exe:Zone.Identifier fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 1 IoCs
description ioc Process File created \??\c:\programdata\44def37582\bdif.exe:Zone.Identifier fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1308 schtasks.exe 3640 schtasks.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5004 fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe 4984 bdif.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4984 5004 fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe 81 PID 5004 wrote to memory of 4984 5004 fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe 81 PID 5004 wrote to memory of 4984 5004 fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe 81 PID 4984 wrote to memory of 116 4984 bdif.exe 92 PID 4984 wrote to memory of 3576 4984 bdif.exe 93 PID 4984 wrote to memory of 116 4984 bdif.exe 92 PID 4984 wrote to memory of 3576 4984 bdif.exe 93 PID 4984 wrote to memory of 116 4984 bdif.exe 92 PID 4984 wrote to memory of 3576 4984 bdif.exe 93 PID 4984 wrote to memory of 4460 4984 bdif.exe 94 PID 4984 wrote to memory of 4460 4984 bdif.exe 94 PID 4984 wrote to memory of 4460 4984 bdif.exe 94 PID 4984 wrote to memory of 5112 4984 bdif.exe 95 PID 4984 wrote to memory of 5112 4984 bdif.exe 95 PID 4984 wrote to memory of 5112 4984 bdif.exe 95 PID 3576 wrote to memory of 3640 3576 cmd.exe 100 PID 3576 wrote to memory of 3640 3576 cmd.exe 100 PID 3576 wrote to memory of 3640 3576 cmd.exe 100 PID 116 wrote to memory of 1308 116 cmd.exe 101 PID 116 wrote to memory of 1308 116 cmd.exe 101 PID 116 wrote to memory of 1308 116 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe"1⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
\??\c:\programdata\44def37582\bdif.exec:\programdata\44def37582\bdif.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.execmd.exe /C SCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1308
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C SCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3640
-
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Wc:\programdata\44def375823⤵
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d c:\programdata\44def375823⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD5fe16a136c5f2c6dbfdc19e5aece87361
SHA1c960ae548ae499d0b9df3279095984c64c3e4111
SHA25642ba4a13429b26693044eded719292f50e50e9749cc8e1cfb268c6d0b9fd9e1c
SHA51233de335eeec2e67616a2466adadefe5f7d1ece12f511a0c4fc479a1a194a05393975b25fd3662d7033d9418845cfdd6f111e2f002dfd4f2d3949d57372aef78f