Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
0851214338908a19195bca629ab00228_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
0851214338908a19195bca629ab00228_JaffaCakes118.exe
-
Size
212KB
-
MD5
0851214338908a19195bca629ab00228
-
SHA1
804648ef016a3f0fb889228a70bcb78189a59d1c
-
SHA256
d3cf19c097334f7138630e2fe06585b80b25e5867e77e84415f01f0f411a796e
-
SHA512
3bd1e73dc52f66dd6f6fd56ba26fbd65d7c762a2ed1491532299d03fb2cce5ab73fadf826f46d41f8c08eb568d61b94fa1b3a9e8bba062a8a6c19be0d0891794
-
SSDEEP
6144:otqKopK4ivSq8Kweo5htrb5AcSli0JQVZkiWTfh:G4pKFKLfftnCTQVKiW
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\318:TCP = "318:TCP:*:Enabled:" regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile regedit.exe -
Executes dropped EXE 3 IoCs
pid Process 1188 systemram.exe 3080 systemram.exe 1380 systemram.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Systemram.exe 0851214338908a19195bca629ab00228_JaffaCakes118.exe File created C:\Windows\SysWOW64\radmin.reg 0851214338908a19195bca629ab00228_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0851214338908a19195bca629ab00228_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemram.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemram.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemram.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3928 regedit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3152 wrote to memory of 3928 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 82 PID 3152 wrote to memory of 3928 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 82 PID 3152 wrote to memory of 3928 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 82 PID 3152 wrote to memory of 1188 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 83 PID 3152 wrote to memory of 1188 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 83 PID 3152 wrote to memory of 1188 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 83 PID 3152 wrote to memory of 3080 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 84 PID 3152 wrote to memory of 3080 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 84 PID 3152 wrote to memory of 3080 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 84 PID 3152 wrote to memory of 1476 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 86 PID 3152 wrote to memory of 1476 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 86 PID 3152 wrote to memory of 1476 3152 0851214338908a19195bca629ab00228_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0851214338908a19195bca629ab00228_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0851214338908a19195bca629ab00228_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\system32\radmin.reg2⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3928
-
-
C:\Windows\SysWOW64\systemram.exeC:\Windows\system32\systemram.exe /install /silence2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1188
-
-
C:\Windows\SysWOW64\systemram.exeC:\Windows\system32\systemram.exe /start2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c clear.bat2⤵
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\systemram.exe"C:\Windows\SysWOW64\systemram.exe" /service1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD5030679d31b62e3182c0ae8e27c24097d
SHA158620fd4d156b7cc3f9b4c988507abb113096dd4
SHA256df2bd9f5578cb738fe3b7f279a752451238be821a5d7d1267e8b802a60fe7858
SHA512d751a77a7b0943ca68729142de04210abb3696707df7758aa2a8a69d6efa795cced340aaf6dcf0b24d03f6de1246a251be8b96fa59da6bf0d09378a0d0c20359
-
Filesize
189KB
MD52e65fe5796600e8203030026a861273d
SHA181f91f591b597aa4a4c61b0d21f6fcd806edb5ba
SHA256b2ec88e4c0dbd531c84fe68507bf8bb8c90314075923428efcc81f9881a834fc
SHA512a51674c01a6604dc4db4b6754bd28c08e4a58348def20190352b92cb134648b2924927affd7ca77be93e116aa614e1794b4403b484b27a7eede6c6ac01fdf04f
-
Filesize
617B
MD5cde89edf854d3c3efe11322e9d1dc5fe
SHA159014d33f373d79fd723bcc9cd67d85260d599b9
SHA256c8b8f692b654de13f1f8b2f2044918caf7b66729d50a203cb8c5b093bdee76fc
SHA5124d253aa485f1fc7c5eb6e35ba7c36b51e2bc2b93c3e82099fa68ec54a0640b1e1688dfa4817c22997f06fa47154ce5c292d610d89c54f150453390071bcb9d15