Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe
-
Size
132KB
-
MD5
01715459087352c0153e4ec2b13ac897
-
SHA1
5b0961cdb41f13ce78873dfadc15920d0ce29d36
-
SHA256
9182853907b01f155f7c9a9258ea47bcf3f0cc61e77db7b1b73516c8ff820e56
-
SHA512
327c7dba5d494efe722bc270a99cfa3c84e2ca071ade784efbe309caff70242541ce91a3b65f9c0280089b45034fc86595f8468ad7d04f788c7c85627363e394
-
SSDEEP
3072:SdkfO5tm0CZusEKuOu3AMrcl3EbRV3F/:gkF0quY5u5yK/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1924 taskhost.exe 3160 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3232 set thread context of 2144 3232 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 89 PID 1924 set thread context of 3160 1924 taskhost.exe 93 -
Program crash 2 IoCs
pid pid_target Process procid_target 1840 3232 WerFault.exe 88 2740 1924 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3232 wrote to memory of 2144 3232 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 89 PID 3232 wrote to memory of 2144 3232 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 89 PID 3232 wrote to memory of 2144 3232 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 89 PID 3232 wrote to memory of 2144 3232 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 89 PID 3232 wrote to memory of 2144 3232 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 89 PID 2144 wrote to memory of 1924 2144 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 92 PID 2144 wrote to memory of 1924 2144 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 92 PID 2144 wrote to memory of 1924 2144 01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe 92 PID 1924 wrote to memory of 3160 1924 taskhost.exe 93 PID 1924 wrote to memory of 3160 1924 taskhost.exe 93 PID 1924 wrote to memory of 3160 1924 taskhost.exe 93 PID 1924 wrote to memory of 3160 1924 taskhost.exe 93 PID 1924 wrote to memory of 3160 1924 taskhost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\01715459087352c0153e4ec2b13ac897_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\01715459087352c0153e4ec2b13ac897_JaffaCakes118.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 2924⤵
- Program crash
PID:2740
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 2922⤵
- Program crash
PID:1840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3232 -ip 32321⤵PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1924 -ip 19241⤵PID:3140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4324,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4336 /prefetch:81⤵PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5abe6cc8b0f25cabc06476c247d587630
SHA170b3b28cf1aab15a52d13eb5c6ffd2cb20903497
SHA25647afd7261d415ec3600d050cf758610ae68b4b1aa5da77e078015fd142e308f4
SHA5125addf151defdae35e89562ca22a788baee655ff835b391ba1f327cbc5de847557a70aac1f7948e081780b3d3116db7296ffc6a153fe772e0f3cb5c90dac0eef3