Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe
-
Size
260KB
-
MD5
08445b8d699b5da5c6bac58c054effcb
-
SHA1
acf7d7a9ad753809310a969dc52c09391d92038a
-
SHA256
e9c11fed92f4e800f4d084a1d9d8283383d485f07c58dc60888dadc152c60af4
-
SHA512
9a2cbf92ef2dcbafe83cc9cdeb307f01e6e5726f85c92bbedc50f9cdc1e4dea412d4606bb0717e809e2df11fb0c683fa1b366e83fa7afe77c486c27599a1dcbb
-
SSDEEP
6144:8hyZ/gWPXo/mcX7iISJf+kJqP1KmpQ+GftEptEz:sFEHMyJWe41K7+KB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1588 server.exe 4536 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1588 server.exe 1588 server.exe 1588 server.exe 1588 server.exe 4536 server.exe 4536 server.exe 4536 server.exe 4536 server.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3904 wrote to memory of 1588 3904 08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe 82 PID 3904 wrote to memory of 1588 3904 08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe 82 PID 3904 wrote to memory of 1588 3904 08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe 82 PID 1588 wrote to memory of 3388 1588 server.exe 55 PID 1588 wrote to memory of 3388 1588 server.exe 55 PID 1588 wrote to memory of 3388 1588 server.exe 55 PID 1588 wrote to memory of 3388 1588 server.exe 55 PID 3904 wrote to memory of 4536 3904 08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe 83 PID 3904 wrote to memory of 4536 3904 08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe 83 PID 3904 wrote to memory of 4536 3904 08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe 83 PID 4536 wrote to memory of 3388 4536 server.exe 55 PID 4536 wrote to memory of 3388 4536 server.exe 55 PID 4536 wrote to memory of 3388 4536 server.exe 55 PID 4536 wrote to memory of 3388 4536 server.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08445b8d699b5da5c6bac58c054effcb_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5c15234d0aa3caa25c4012491176dbf4f
SHA1b37a4c9bcd3ea73443487f462dcedbaea8bffdc9
SHA256a16f83dfdc65db86da90b3f1fa773cf5ba77cccbc1dd402e9663f26981164fad
SHA512d3526223ff7a7527caeec51a858b50164ec0d524dd6dbce5e206e4bdcdeae89f4ae8d3a2d7a25a57a010ef0e4b32f8f8f52be270f4fdcee78f97cee7cd238ae6