Analysis
-
max time kernel
94s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe
-
Size
368KB
-
MD5
04d6d83d643c2a8d809fe1f648555dc5
-
SHA1
f8d5e78421b09f79f3b4443eabbdc3d2ffd87087
-
SHA256
d1e8eff88646c36adda6c24d9eceaef18704b04673afab83955d2bd11a8db327
-
SHA512
de8ea6029ed57a13385ad56a44fa2f11cfc2ea4f3c2fc14dca243eb3bfb031185c57db6fe58e9334c063a7047563af1e87eccf1f73c8e4d2871b11953c849c0b
-
SSDEEP
6144:R49hjtOt06+rrJNJfL78vSScQ4PpRZbGYYSHdmWZBIH0IaU67n7cfx9ilqPn+:R4PjtOb2fJ8vN4PgYBHppIaz77ea+n+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4068 smin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4068 set thread context of 3628 4068 smin.com 83 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\PWALZV.DAT 04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe File created C:\Windows\smin.com 04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe File opened for modification C:\Windows\smin.com 04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe File created C:\Windows\uninstal.bat 04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4336 3628 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smin.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 960 04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe Token: SeDebugPrivilege 4068 smin.com -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4068 wrote to memory of 3628 4068 smin.com 83 PID 4068 wrote to memory of 3628 4068 smin.com 83 PID 4068 wrote to memory of 3628 4068 smin.com 83 PID 4068 wrote to memory of 3628 4068 smin.com 83 PID 4068 wrote to memory of 3628 4068 smin.com 83 PID 960 wrote to memory of 3312 960 04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe 87 PID 960 wrote to memory of 3312 960 04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe 87 PID 960 wrote to memory of 3312 960 04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04d6d83d643c2a8d809fe1f648555dc5_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat2⤵
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\smin.comC:\Windows\smin.com1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\windows\SysWOW64\svchost.exeC:\windows\system32\svchost.exe2⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 123⤵
- Program crash
PID:4336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3628 -ip 36281⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD504d6d83d643c2a8d809fe1f648555dc5
SHA1f8d5e78421b09f79f3b4443eabbdc3d2ffd87087
SHA256d1e8eff88646c36adda6c24d9eceaef18704b04673afab83955d2bd11a8db327
SHA512de8ea6029ed57a13385ad56a44fa2f11cfc2ea4f3c2fc14dca243eb3bfb031185c57db6fe58e9334c063a7047563af1e87eccf1f73c8e4d2871b11953c849c0b
-
Filesize
218B
MD5451cdaee51f026db99c3dfa5a2dfb531
SHA1241f5d4e01d0a18c3264de14bcec3a72cc0c392c
SHA25649b4c3b6c2cec1e9c9975a58e0e400ad924a75c6ff7c840a43e1fadf35869d32
SHA512ed02b446544e61337781b4c5be08e638eb957f44625d349242e6a6fb59861306ca9470e5f4c66d268fd7f87a954f5d687c6dbbf14f18bfbfa5aca82698451ef4