Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe
-
Size
41KB
-
MD5
07d0c2dca5e733ac8e3617f80cb8809e
-
SHA1
ff752513bfb17eff79214813c15622613e946ed1
-
SHA256
e08043755269f6905b0042d9ab8db218d3a64b20ee72305e0beb337a82d06ae8
-
SHA512
d15ef1432dad50b51a41e1c361e25d8b3a5ec52084957af26d9e700a896cd3a99c15b0d06eabd4e127a76150a5e1bf6009bc2c2f016ae4795cb29abbdc99e7a1
-
SSDEEP
768:QGBar1ZIZYnfI9opm6AIHIjaI7g9mVmUnAoNE/W5dRV8:fW1ZIZqI9opm6AIHIjzmUZNzd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 sxhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2980 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe 2980 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2648 2980 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2648 2980 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2648 2980 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2648 2980 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2744 2980 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2744 2980 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2744 2980 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2744 2980 07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2512 2648 sxhost.exe 34 PID 2648 wrote to memory of 2512 2648 sxhost.exe 34 PID 2648 wrote to memory of 2512 2648 sxhost.exe 34 PID 2648 wrote to memory of 2512 2648 sxhost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07d0c2dca5e733ac8e3617f80cb8809e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\07D0C2~1.EXE >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD507d0c2dca5e733ac8e3617f80cb8809e
SHA1ff752513bfb17eff79214813c15622613e946ed1
SHA256e08043755269f6905b0042d9ab8db218d3a64b20ee72305e0beb337a82d06ae8
SHA512d15ef1432dad50b51a41e1c361e25d8b3a5ec52084957af26d9e700a896cd3a99c15b0d06eabd4e127a76150a5e1bf6009bc2c2f016ae4795cb29abbdc99e7a1