Analysis
-
max time kernel
83s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 12:45
Static task
static1
Behavioral task
behavioral1
Sample
fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe
-
Size
205KB
-
MD5
fe8e61ef43583c2d6a67c49f626c657c
-
SHA1
0f067362b6285e4858250c606c4d1587e4e41e72
-
SHA256
ca90cb41af3bd78fcfd594aa6e92ba713bc8f39928f577036f97b62b9f2a8be3
-
SHA512
6b8139d7c51c057c886d68e06998a0899756d81fb3cf9288c36accd1146c05213f7715b8e34ac9be2bb78f652ef67cd1282a7c57bbdbcaf39fa608038618eae1
-
SSDEEP
6144:JMmdbOsHCU8TCOXlUS9f6mLTjr5/FUv0A+YpYA9OTZIu:OISsHCU8T5f9imLndyv0A16Tv
Malware Config
Extracted
tofsee
94.75.255.140
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1464 daudur.exe 2728 daudur.exe -
Loads dropped DLL 3 IoCs
pid Process 2256 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 2256 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 1464 daudur.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\daudur.exe\" /r" fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2068 set thread context of 2256 2068 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 29 PID 1464 set thread context of 2728 1464 daudur.exe 31 PID 2728 set thread context of 2976 2728 daudur.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daudur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daudur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2256 2068 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2256 2068 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2256 2068 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2256 2068 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2256 2068 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2256 2068 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2256 2068 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2256 2068 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2256 2068 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 29 PID 2256 wrote to memory of 1464 2256 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 30 PID 2256 wrote to memory of 1464 2256 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 30 PID 2256 wrote to memory of 1464 2256 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 30 PID 2256 wrote to memory of 1464 2256 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 30 PID 1464 wrote to memory of 2728 1464 daudur.exe 31 PID 1464 wrote to memory of 2728 1464 daudur.exe 31 PID 1464 wrote to memory of 2728 1464 daudur.exe 31 PID 1464 wrote to memory of 2728 1464 daudur.exe 31 PID 1464 wrote to memory of 2728 1464 daudur.exe 31 PID 1464 wrote to memory of 2728 1464 daudur.exe 31 PID 1464 wrote to memory of 2728 1464 daudur.exe 31 PID 1464 wrote to memory of 2728 1464 daudur.exe 31 PID 1464 wrote to memory of 2728 1464 daudur.exe 31 PID 2256 wrote to memory of 2832 2256 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 33 PID 2256 wrote to memory of 2832 2256 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 33 PID 2256 wrote to memory of 2832 2256 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 33 PID 2256 wrote to memory of 2832 2256 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 33 PID 2728 wrote to memory of 2976 2728 daudur.exe 32 PID 2728 wrote to memory of 2976 2728 daudur.exe 32 PID 2728 wrote to memory of 2976 2728 daudur.exe 32 PID 2728 wrote to memory of 2976 2728 daudur.exe 32 PID 2728 wrote to memory of 2976 2728 daudur.exe 32 PID 2728 wrote to memory of 2976 2728 daudur.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\daudur.exe"C:\Users\Admin\daudur.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\daudur.exe"C:\Users\Admin\daudur.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6402.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5e314b01cc421e267c0805d1136bddd36
SHA1802252dc01db55c376a018e8b3d2be91f60c3cd2
SHA256e6b5a94f7aa7a037a520ee8022951b82084ad6de79a54cd2abfd4bbf61c47dfb
SHA51224290d19bf06b68d4d491aebe7df5497f38ee7d6f841ddb8b98b27a7bd2e37dd38ff73758bce998058d889b50a1636bbaf596c31008d58773ab3f61d82e127c1
-
Filesize
205KB
MD5fe8e61ef43583c2d6a67c49f626c657c
SHA10f067362b6285e4858250c606c4d1587e4e41e72
SHA256ca90cb41af3bd78fcfd594aa6e92ba713bc8f39928f577036f97b62b9f2a8be3
SHA5126b8139d7c51c057c886d68e06998a0899756d81fb3cf9288c36accd1146c05213f7715b8e34ac9be2bb78f652ef67cd1282a7c57bbdbcaf39fa608038618eae1