Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe
-
Size
635KB
-
MD5
03e9df0ca01c4d83a30ebfeac6e8063b
-
SHA1
be6f9a7d6252ca87f4fd8529c826648c2a1983ca
-
SHA256
0aa7bbd7fc2a2487cdb7b1c4630edc7de831f889eec8cf389a7ef192cb4e801a
-
SHA512
5b9bef1ed8c8f583604a43b8ee3f47ef9471bebf2dcbdd65a2bfcfd90bd96d7c6233c64a369065d9be60fc46a2f9a428ea8037392dae954cd4d7bcda19b67ff2
-
SSDEEP
12288:AAXozHlCHUa8V53DrvuscsF3Z4mxxrxPCjcngNPF:5nH3s3DrvuwQmX4NPF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2924 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 windows.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\uninstal.bat 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe File created C:\Windows\windows.exe 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe File opened for modification C:\Windows\windows.exe 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1728 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe Token: SeDebugPrivilege 2540 windows.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 windows.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2924 1728 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2924 1728 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2924 1728 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2924 1728 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2924 1728 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2924 1728 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe 31 PID 1728 wrote to memory of 2924 1728 03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03e9df0ca01c4d83a30ebfeac6e8063b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\windows.exeC:\Windows\windows.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD514effe4df1021329d04e64cc9aae75e2
SHA1a99b81deabbc649b897dfabfae569e7b765c8b9c
SHA2560291ab4667d7c4901e6554365dac6538f8568655304fe603ab74a991b9447e80
SHA512abd36e5e96812370bc30b8aec636fc9230f4ca2ee96abc6fdc4a39fde8dc312e2a4d041fd903615440b9ef2b4864ad46094febde41705204cd2906d874cd2c54
-
Filesize
635KB
MD503e9df0ca01c4d83a30ebfeac6e8063b
SHA1be6f9a7d6252ca87f4fd8529c826648c2a1983ca
SHA2560aa7bbd7fc2a2487cdb7b1c4630edc7de831f889eec8cf389a7ef192cb4e801a
SHA5125b9bef1ed8c8f583604a43b8ee3f47ef9471bebf2dcbdd65a2bfcfd90bd96d7c6233c64a369065d9be60fc46a2f9a428ea8037392dae954cd4d7bcda19b67ff2