Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe
-
Size
3.9MB
-
MD5
08423850e86acb1a6765ab931ad266fa
-
SHA1
79e08264661062557dc0ee65ded64a9033908dfd
-
SHA256
668b8ed8f01cbbc5e8cc828b27b47ba72245eea9300f5b25fa434efdd5e955ea
-
SHA512
701fb2cdd1f8751b3cddea8ed565d2a763a7397b82336c2d64146f05e0e87194a666f4d6072f2b02084e8f2b30d67a9ba0696371f44d4a6616181fe2b04912da
-
SSDEEP
98304:owV6HxskamOIxJiEl7B491NGYGn5fCmJ+MqVB4/x:oqWTOYJL2ny9XRqS
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1892 explorer.exe 2884 iexplore.exe 4828 iexplore.exe 4864 explorer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1860 set thread context of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 2884 set thread context of 4828 2884 iexplore.exe 90 PID 1892 set thread context of 4864 1892 explorer.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 772 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 772 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 772 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 772 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 4864 explorer.exe 4864 explorer.exe 4828 iexplore.exe 4828 iexplore.exe 4864 explorer.exe 4864 explorer.exe 4828 iexplore.exe 4828 iexplore.exe 4864 explorer.exe 4864 explorer.exe 4828 iexplore.exe 4828 iexplore.exe 4864 explorer.exe 4864 explorer.exe 4828 iexplore.exe 4828 iexplore.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe 4864 explorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1860 wrote to memory of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 1860 wrote to memory of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 1860 wrote to memory of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 1860 wrote to memory of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 1860 wrote to memory of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 1860 wrote to memory of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 1860 wrote to memory of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 1860 wrote to memory of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 1860 wrote to memory of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 1860 wrote to memory of 772 1860 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 87 PID 772 wrote to memory of 1892 772 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 88 PID 772 wrote to memory of 1892 772 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 88 PID 772 wrote to memory of 1892 772 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 88 PID 772 wrote to memory of 2884 772 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 89 PID 772 wrote to memory of 2884 772 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 89 PID 772 wrote to memory of 2884 772 08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe 89 PID 2884 wrote to memory of 4828 2884 iexplore.exe 90 PID 2884 wrote to memory of 4828 2884 iexplore.exe 90 PID 2884 wrote to memory of 4828 2884 iexplore.exe 90 PID 2884 wrote to memory of 4828 2884 iexplore.exe 90 PID 2884 wrote to memory of 4828 2884 iexplore.exe 90 PID 2884 wrote to memory of 4828 2884 iexplore.exe 90 PID 2884 wrote to memory of 4828 2884 iexplore.exe 90 PID 2884 wrote to memory of 4828 2884 iexplore.exe 90 PID 2884 wrote to memory of 4828 2884 iexplore.exe 90 PID 2884 wrote to memory of 4828 2884 iexplore.exe 90 PID 1892 wrote to memory of 4864 1892 explorer.exe 91 PID 1892 wrote to memory of 4864 1892 explorer.exe 91 PID 1892 wrote to memory of 4864 1892 explorer.exe 91 PID 1892 wrote to memory of 4864 1892 explorer.exe 91 PID 1892 wrote to memory of 4864 1892 explorer.exe 91 PID 1892 wrote to memory of 4864 1892 explorer.exe 91 PID 1892 wrote to memory of 4864 1892 explorer.exe 91 PID 1892 wrote to memory of 4864 1892 explorer.exe 91 PID 1892 wrote to memory of 4864 1892 explorer.exe 91 PID 1892 wrote to memory of 4864 1892 explorer.exe 91 PID 4864 wrote to memory of 4236 4864 explorer.exe 92 PID 4864 wrote to memory of 4236 4864 explorer.exe 92 PID 4864 wrote to memory of 4236 4864 explorer.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08423850e86acb1a6765ab931ad266fa_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe" --mn=03⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe" --mn=04⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19656.bat"5⤵
- System Location Discovery: System Language Discovery
PID:4236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\iexplore.exe"C:\Users\Admin\AppData\Local\Temp\iexplore.exe" --mn=0 --ch=13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\iexplore.exe"C:\Users\Admin\AppData\Local\Temp\iexplore.exe" --mn=0 --ch=14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20123.bat"5⤵PID:1864
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD5e6c2f1c6c881e9ac4baed864546b1b96
SHA1f13fe2c00a85b1779e5fa100e757b61c6e847587
SHA2562ca797e4453711e755550a1ebd951952de82212cc83c9ed75837695f1597fecd
SHA512ee07cd78b6929fca6f1f6b6d611ba0c4d23f5af64b41307c9a343bb0bd46bb9dfe5411603256d93bc32477b13421451c9a9c4c16bcae2a8b5b903ee1b20591d1
-
Filesize
183B
MD57e44f439e0c2bc4dcc733694d54c171e
SHA1b79ea829888ebe84147d1871f3714314e30594b3
SHA256d805952a8559bfc416fda4c80bb914e56ddc16eae4d521e64901865899e1b42c
SHA512a31a2b3a285bb7072cda209f139cf15ef7d640cace279b194a09c1dcc24f6284e5e0caf4632140a8c13c60fe72d71fe806b6977ab4f281c36fe07e99d3b47211
-
Filesize
3.9MB
MD508423850e86acb1a6765ab931ad266fa
SHA179e08264661062557dc0ee65ded64a9033908dfd
SHA256668b8ed8f01cbbc5e8cc828b27b47ba72245eea9300f5b25fa434efdd5e955ea
SHA512701fb2cdd1f8751b3cddea8ed565d2a763a7397b82336c2d64146f05e0e87194a666f4d6072f2b02084e8f2b30d67a9ba0696371f44d4a6616181fe2b04912da