Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 22:51

General

  • Target

    07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe

  • Size

    342KB

  • MD5

    07bf0d794610eab72b0ac85ed40aabf1

  • SHA1

    eb1badb78457daab0d03fbeefbbbcc32c05a9e05

  • SHA256

    19ba596c9afab5f63bd263ea8e14b51185005eb3bbdc47837d126ba46eeaea26

  • SHA512

    6f9d793e5a109325065d48d37eac89ad60b28e154f1e1fcfb2284abe59363bc3ea50d95a06d4d17d1ae5b19811421307a7a2ae3ea57c98d879d8c9bc7cd5204c

  • SSDEEP

    3072:WIDCldZsGbYS9fAgo3ji0IDCldZsGbYqVDrXhzlrOgkVDpBSqao9c3HwsanTdgyc:Wrv6W0rvX/eSqjc3HsTaxoq/cRzSZ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 49 IoCs
  • Suspicious use of SetThreadContext 25 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 28 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Users\Admin\AppData\Roaming\tgbi.exe
        C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe -dwup
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Users\Admin\AppData\Roaming\tgbi.exe
          C:\Users\Admin\AppData\Local\Temp\07bf0d794610eab72b0ac85ed40aabf1_JaffaCakes118.exe -dwup
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1596
          • C:\Users\Admin\AppData\Roaming\tgbi.exe
            C:\Users\Admin\AppData\Roaming\tgbi.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4776
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2540
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:4060
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1448
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:944
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1120
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:4896
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4008
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:3676
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:928
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:4960
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1496
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:1784
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2668
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:2316
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2464
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:2380
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3592
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:2912
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:972
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:1392
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2032
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:2852
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1708
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:4428
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3256
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:5100
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3768
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:748
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:4156
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:1376
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:4456
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:4408
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3672
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:4224
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3020
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:4276
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2500
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:3932
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:220
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:4120
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3624
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:1932
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3384
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:4708
            • C:\Users\Admin\AppData\Roaming\tgbi.exe
              C:\Users\Admin\AppData\Roaming\tgbi.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:4712
              • C:\Users\Admin\AppData\Roaming\tgbi.exe
                C:\Users\Admin\AppData\Roaming\tgbi.exe
                7⤵
                • Executes dropped EXE
                PID:4352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\tgbi.exe

    Filesize

    342KB

    MD5

    07bf0d794610eab72b0ac85ed40aabf1

    SHA1

    eb1badb78457daab0d03fbeefbbbcc32c05a9e05

    SHA256

    19ba596c9afab5f63bd263ea8e14b51185005eb3bbdc47837d126ba46eeaea26

    SHA512

    6f9d793e5a109325065d48d37eac89ad60b28e154f1e1fcfb2284abe59363bc3ea50d95a06d4d17d1ae5b19811421307a7a2ae3ea57c98d879d8c9bc7cd5204c

  • memory/944-35-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1596-22-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1596-15-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1596-16-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1596-51-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1784-63-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2316-69-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2380-76-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2912-83-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3676-49-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4060-28-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4776-21-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/4776-19-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/4896-42-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4960-56-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4996-2-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4996-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4996-3-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB