Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe
-
Size
136KB
-
MD5
073c107c0606bb20f6f495312da10d63
-
SHA1
081d9f954653fd3d1bae1f73f7bf1bd5cef52592
-
SHA256
85834cc7d891b2897920cc7423e64a70e9a6e038ea99f6af2aa9c09e89f3fada
-
SHA512
5bdc41f04b3dedfd7ab59e819a9bd3763a91bae727f3660f0de68689e7e79652010af3be746c666f53ff627a57cc42c5013a7eb2bf43ff5431f55a095616b9e8
-
SSDEEP
3072:tbuV+9otRfE8cpdJxGcevh1c8Fiq5qUy5U:tbKfifScSm8oq5rw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2688 taskhost.exe 2740 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2132 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 2132 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2188 set thread context of 2132 2188 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 30 PID 2688 set thread context of 2740 2688 taskhost.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2132 2188 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2132 2188 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2132 2188 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2132 2188 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2132 2188 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2132 2188 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2688 2132 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 31 PID 2132 wrote to memory of 2688 2132 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 31 PID 2132 wrote to memory of 2688 2132 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 31 PID 2132 wrote to memory of 2688 2132 073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe 31 PID 2688 wrote to memory of 2740 2688 taskhost.exe 32 PID 2688 wrote to memory of 2740 2688 taskhost.exe 32 PID 2688 wrote to memory of 2740 2688 taskhost.exe 32 PID 2688 wrote to memory of 2740 2688 taskhost.exe 32 PID 2688 wrote to memory of 2740 2688 taskhost.exe 32 PID 2688 wrote to memory of 2740 2688 taskhost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\073c107c0606bb20f6f495312da10d63_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\073c107c0606bb20f6f495312da10d63_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:2740
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58028a0f3f71d4f3d6aefb23874666393
SHA13d7e7ada776099fbe8a824c56e837d0c0562a217
SHA2569d88bcc4c0b05ae8338683a6a302e38b67da1560f99cc1fafc27652871d98ef8
SHA5126162ccc5b017e74c1bb07ad4394a1b7f63f2e6a362b70ce5a330577873bc8df88938f342f2e81efc4e7afea5d5e128fe712c6e36dc24ebf9f32f79d911bfd3ab