Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 09:29
Static task
static1
Behavioral task
behavioral1
Sample
009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe
-
Size
132KB
-
MD5
009d0f4eba5c4d0eb1125c87f3b0115b
-
SHA1
92389180df1325d1d1bc625ffd7ce98ee649b8b7
-
SHA256
ff36f6f516121a9ac12534791f47528e5958ce0bde68c03b604779bce7fcca88
-
SHA512
327e67ff1d4ab0cff75ad863c8f1f876dd84236e11fbe8af876169b1cc337780cdbc31f57b6ba474d973d709503d830c7e5fff58ca32cc3cc7c45ee5b3bd2dc8
-
SSDEEP
3072:DbhlKctmP7zFHt0Gk8VXcANmF6uGmK8nN3:DbKDzdtw2XPNmN/K8N3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3264 taskhost.exe 1296 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\taskhost.exe" taskhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4996 set thread context of 5032 4996 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe 82 PID 3264 set thread context of 1296 3264 taskhost.exe 87 -
Program crash 2 IoCs
pid pid_target Process procid_target 4500 4996 WerFault.exe 81 1704 3264 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4996 wrote to memory of 5032 4996 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe 82 PID 4996 wrote to memory of 5032 4996 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe 82 PID 4996 wrote to memory of 5032 4996 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe 82 PID 4996 wrote to memory of 5032 4996 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe 82 PID 4996 wrote to memory of 5032 4996 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe 82 PID 5032 wrote to memory of 3264 5032 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe 85 PID 5032 wrote to memory of 3264 5032 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe 85 PID 5032 wrote to memory of 3264 5032 009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe 85 PID 3264 wrote to memory of 1296 3264 taskhost.exe 87 PID 3264 wrote to memory of 1296 3264 taskhost.exe 87 PID 3264 wrote to memory of 1296 3264 taskhost.exe 87 PID 3264 wrote to memory of 1296 3264 taskhost.exe 87 PID 3264 wrote to memory of 1296 3264 taskhost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\009d0f4eba5c4d0eb1125c87f3b0115b_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 3044⤵
- Program crash
PID:1704
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 2922⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4996 -ip 49961⤵PID:468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3264 -ip 32641⤵PID:1536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5804f41efa739814d91bb08e91ca15776
SHA1f17c8684ab8f1b8c6287c2164c04f035ec889cb1
SHA256a26c41041adba864b6b4a9f2066d225f5084fe3630a33c88602313bac2b4c5d9
SHA51226b461b6a06f4db1ab005270f7b12f72fe55b95e813cab4bca66873d9bc1c51790fcb3e5b103d88e67e3d38d841e0c5a3d8c4d04d5f1dc31112ab2ebe0602f4d