Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
05595fa61734a9acede85154fc8fe03b
-
SHA1
c3842ef0d4b88b53098c9fcb36082219f39b112f
-
SHA256
9d077371cd1d6dc2b8b337d0bc978afb1e910a947bb0e14c15a37c70c745704c
-
SHA512
9e959d30eac39b3fe81f36360f29f4ecdc2c5d7b5b71a12c593f0754860e696822530e022552db3c0d9c1df189a18425bb7030bf7a0d869331a2bbda154f6066
-
SSDEEP
49152:yopU78Oe8T6UQJ+Ss4ie6tu4HY90Jm9WbV:y+E1e87Y+QKZm9WbV
Malware Config
Extracted
bitrat
1.38
eter102.dvrlists.com:3050
-
communication_password
fea0f7015af40ae69a386f06f28a8d31
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\outlook = "\"C:\\Users\\Admin\\AppData\\Roaming\\outlook.exe\"" 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe -
pid Process 4560 powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4532 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 4532 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 4532 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 4532 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2160 set thread context of 4532 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 93 -
resource yara_rule behavioral2/memory/4532-2406-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4532-2459-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 4560 powershell.exe 4560 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe Token: SeDebugPrivilege 4560 powershell.exe Token: SeShutdownPrivilege 4532 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4532 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 4532 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4844 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 91 PID 2160 wrote to memory of 4844 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 91 PID 2160 wrote to memory of 4844 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 91 PID 2160 wrote to memory of 4620 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 92 PID 2160 wrote to memory of 4620 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 92 PID 2160 wrote to memory of 4620 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 92 PID 2160 wrote to memory of 4532 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 93 PID 2160 wrote to memory of 4532 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 93 PID 2160 wrote to memory of 4532 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 93 PID 2160 wrote to memory of 4532 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 93 PID 2160 wrote to memory of 4532 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 93 PID 2160 wrote to memory of 4532 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 93 PID 2160 wrote to memory of 4532 2160 05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe 93 PID 4844 wrote to memory of 4560 4844 WScript.exe 94 PID 4844 wrote to memory of 4560 4844 WScript.exe 94 PID 4844 wrote to memory of 4560 4844 WScript.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Glkcwxl.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\outlook.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
-
C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe2⤵PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137B
MD541c8a8551ff6fc7a2b9aadcff976ca0f
SHA1444db8be2af0b1128229ac46e4963e0570159c3c
SHA256bc147b5a209f5db13fa86ce6906be0d4dfec76469af3f304d490f10443cf5df5
SHA512b52b716c3827a20d9298a32c8243f8e506c77c4be10e29e39a17ba303d0c65d70e257ab4f1c7368e99608c53ec12e6a1e7287e3d644df1f4cdbc539a501763c8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82