Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe
-
Size
985KB
-
MD5
ffdf7f7dbeecbeb16757be9807b80987
-
SHA1
24a0bead7b9376fcf7293d7d5df60a7a0f27db2a
-
SHA256
d0f9ad4ef39bb2972ee00b6b7ba9dd94d192b3b2cbfc26cc89d0e9e562ae666c
-
SHA512
5137e3754ee37a251270fbe89a2e66192e1a9ef40435a473c11ca473dacea8a46de314ce0640313cfe9e687d64343442186afb842a55231efe71dd098a669953
-
SSDEEP
12288:NieDHBRs0GXQCxeW5xH5lWGutCjHvascYCUbigdmAN8MxkBGKWrU43xY/e/y4P+g:jgpeW/VrJiZWYigAZJ0rY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3176 winupdate.exe -
Uses the VBS compiler for execution 1 TTPs
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\melt.bat vbc.exe File created C:\Windows\SysWOW64\winupdate.exe vbc.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3940 set thread context of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3940 wrote to memory of 2512 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 82 PID 3940 wrote to memory of 2512 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 82 PID 3940 wrote to memory of 2512 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 82 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3940 wrote to memory of 3184 3940 ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe 83 PID 3184 wrote to memory of 3176 3184 vbc.exe 84 PID 3184 wrote to memory of 3176 3184 vbc.exe 84 PID 3184 wrote to memory of 3176 3184 vbc.exe 84 PID 3184 wrote to memory of 2532 3184 vbc.exe 86 PID 3184 wrote to memory of 2532 3184 vbc.exe 86 PID 3184 wrote to memory of 2532 3184 vbc.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffdf7f7dbeecbeb16757be9807b80987_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2512
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\winupdate.exe"C:\Windows\System32\winupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\melt.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97B
MD55b722b22b19fbf4eb90e8c068ecbb379
SHA139d644cad70f6398f39ebda54bce6f3b49fc685b
SHA2565f1546795b73db8c1877af7256f5a3735b001333a16428188716fbb89f6c15d1
SHA512ba8915515fc2d17fb3ad91ce360866c3040fa61cd467c6df7b54b0debb5629d187782347aa96edaed584039f060387a1cb1151f5100ffdd8a9db8ae715348cd1
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34