Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe
-
Size
130KB
-
MD5
00b3cc65cadd79766ce2351380458734
-
SHA1
94f84a3fa9475baaf4e2738791b39d1aa06c93e6
-
SHA256
f6e5fa25486fceb905f3ddde4f9221aebbba7545d2f9b302bff36e1897f73ee8
-
SHA512
a9f70bcec9e38ff7d43f1ba1ee4026925376db5978df59f8db2f0ea3a5e11cda629db4664efd4391969938bcb18cbbd28e40396f8bce812ba214d10e576caa9b
-
SSDEEP
3072:yJ3+HVRKw27/zdG/1lOpb3WF+ojPu5PkPxQiHQFh26WY7/HAgb:yJeUhm18bs7PTPqiHU2KHP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1020 Lsas.exe -
Loads dropped DLL 2 IoCs
pid Process 2128 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe 2128 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\Lsas.exe 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\Lsas.exe 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\win23.txt Lsas.exe File opened for modification C:\WINDOWS\SysWOW64\win23.txt Lsas.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lsas.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Lsas.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Lsas.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1020 Lsas.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2128 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe 2128 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe 1020 Lsas.exe 1020 Lsas.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1020 2128 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe 31 PID 2128 wrote to memory of 1020 2128 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe 31 PID 2128 wrote to memory of 1020 2128 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe 31 PID 2128 wrote to memory of 1020 2128 00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00b3cc65cadd79766ce2351380458734_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\WINDOWS\SysWOW64\Lsas.exeC:\WINDOWS\system32\Lsas.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5709191d3408d179db0aff8bbbca7e249
SHA1407ef9fff2bbeb2b85738a39c8bbbaa2dcf9b2fd
SHA256ed8f9de65ce3dc77975224b9d88a38dc6f211b6d9bd9ac1659260f92232fc109
SHA512f7b4087507e3fcf834da069cb97db034be549af8d78874166e990a164f7f9a39baa6492906ac56c3c23d0e2a11d8a2634e1c455ac2facded7c8011244f1e1529
-
Filesize
130KB
MD500b3cc65cadd79766ce2351380458734
SHA194f84a3fa9475baaf4e2738791b39d1aa06c93e6
SHA256f6e5fa25486fceb905f3ddde4f9221aebbba7545d2f9b302bff36e1897f73ee8
SHA512a9f70bcec9e38ff7d43f1ba1ee4026925376db5978df59f8db2f0ea3a5e11cda629db4664efd4391969938bcb18cbbd28e40396f8bce812ba214d10e576caa9b