Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe
-
Size
132KB
-
MD5
01715459087352c0153e4ec2b13ac897
-
SHA1
5b0961cdb41f13ce78873dfadc15920d0ce29d36
-
SHA256
9182853907b01f155f7c9a9258ea47bcf3f0cc61e77db7b1b73516c8ff820e56
-
SHA512
327c7dba5d494efe722bc270a99cfa3c84e2ca071ade784efbe309caff70242541ce91a3b65f9c0280089b45034fc86595f8468ad7d04f788c7c85627363e394
-
SSDEEP
3072:SdkfO5tm0CZusEKuOu3AMrcl3EbRV3F/:gkF0quY5u5yK/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2052 taskhost.exe 2020 taskhost.exe -
Loads dropped DLL 3 IoCs
pid Process 376 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 376 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 2052 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2104 set thread context of 376 2104 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 31 PID 2052 set thread context of 2020 2052 taskhost.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2104 wrote to memory of 376 2104 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 31 PID 2104 wrote to memory of 376 2104 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 31 PID 2104 wrote to memory of 376 2104 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 31 PID 2104 wrote to memory of 376 2104 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 31 PID 2104 wrote to memory of 376 2104 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 31 PID 2104 wrote to memory of 376 2104 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 31 PID 376 wrote to memory of 2052 376 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 32 PID 376 wrote to memory of 2052 376 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 32 PID 376 wrote to memory of 2052 376 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 32 PID 376 wrote to memory of 2052 376 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 32 PID 2052 wrote to memory of 2020 2052 taskhost.exe 33 PID 2052 wrote to memory of 2020 2052 taskhost.exe 33 PID 2052 wrote to memory of 2020 2052 taskhost.exe 33 PID 2052 wrote to memory of 2020 2052 taskhost.exe 33 PID 2052 wrote to memory of 2020 2052 taskhost.exe 33 PID 2052 wrote to memory of 2020 2052 taskhost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\01715459087352c0153e4ec2b13ac897_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:2020
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5abe6cc8b0f25cabc06476c247d587630
SHA170b3b28cf1aab15a52d13eb5c6ffd2cb20903497
SHA25647afd7261d415ec3600d050cf758610ae68b4b1aa5da77e078015fd142e308f4
SHA5125addf151defdae35e89562ca22a788baee655ff835b391ba1f327cbc5de847557a70aac1f7948e081780b3d3116db7296ffc6a153fe772e0f3cb5c90dac0eef3