Analysis
-
max time kernel
126s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
0754977cf78c04f276612b123d024060_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0754977cf78c04f276612b123d024060_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0754977cf78c04f276612b123d024060_JaffaCakes118.exe
-
Size
64KB
-
MD5
0754977cf78c04f276612b123d024060
-
SHA1
e0ca98da41194cf0b974f537eb4df7e5c34e6345
-
SHA256
f437e5d3d12b1205d0478f8010bb3997674de4b884bc9fd48c0ecfc0c6e6ccf6
-
SHA512
0b63ff44c7c3483b06b568b1b7731a46744661f815982aece93c7065a5173c0d3dc9c3af7a387dc00282ba855cfd3f61972737b560aeeef55eedf863ebf6bbf1
-
SSDEEP
1536:wygs3cEtU5+SFPmyn2fVC3vIwwrs0oGImV8Hd4:7/U5+MmII0fss0o5d4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2100 iexplore.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\8c781513-9957-4dbb-9321-62a254f69a95 = "C:\\Users\\Admin\\AppData\\Roaming\\gkduk\\gkduk.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\8c781513-9957-4dbb-9321-62a254f69a95 = "C:\\Users\\Admin\\AppData\\Roaming\\gkduk\\gkduk.exe" iexplore.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0754977cf78c04f276612b123d024060_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2100 iexplore.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1088 0754977cf78c04f276612b123d024060_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2100 1088 0754977cf78c04f276612b123d024060_JaffaCakes118.exe 29 PID 1088 wrote to memory of 2100 1088 0754977cf78c04f276612b123d024060_JaffaCakes118.exe 29 PID 1088 wrote to memory of 2100 1088 0754977cf78c04f276612b123d024060_JaffaCakes118.exe 29 PID 1088 wrote to memory of 2100 1088 0754977cf78c04f276612b123d024060_JaffaCakes118.exe 29 PID 1088 wrote to memory of 2100 1088 0754977cf78c04f276612b123d024060_JaffaCakes118.exe 29 PID 2100 wrote to memory of 2276 2100 iexplore.exe 30 PID 2100 wrote to memory of 2276 2100 iexplore.exe 30 PID 2100 wrote to memory of 2276 2100 iexplore.exe 30 PID 2100 wrote to memory of 2276 2100 iexplore.exe 30 PID 2100 wrote to memory of 2276 2100 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0754977cf78c04f276612b123d024060_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0754977cf78c04f276612b123d024060_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- Deletes itself
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-