Analysis
-
max time kernel
92s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe
-
Size
707KB
-
MD5
088f1bece6e88c77d098f62f99d89bb9
-
SHA1
51567c9ca406fab6f226b6a209f80c6de85cffcf
-
SHA256
1ac51534108d6e15ec907dbe1abd95965ec46df675e941f71310b6e2d83fa4cc
-
SHA512
fd52f2f37c48cb3b60ceb961778fa7b9c84ced01284c1e219637f04922561720c10deded4732eb41716b3981825c10270f6c2623dedb547ac1a4c95f2985bd5c
-
SSDEEP
12288:oQn4AB4iq43L1xFzOfAGUl0gG31qaIp+vlJoKe/ZFEFV4EAgD1y6+B9kBR:L4ABz1aAVGFbdHo3FEz4rgD1W9kn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4928 file2.exe 3740 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3384 set thread context of 3740 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 1972 4928 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3740 svchost.exe 3740 svchost.exe 3740 svchost.exe 3740 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 4928 file2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3384 wrote to memory of 4928 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 85 PID 3384 wrote to memory of 4928 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 85 PID 3384 wrote to memory of 4928 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 85 PID 3384 wrote to memory of 3740 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 89 PID 3384 wrote to memory of 3740 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 89 PID 3384 wrote to memory of 3740 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 89 PID 3384 wrote to memory of 3740 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 89 PID 3384 wrote to memory of 3740 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 89 PID 3384 wrote to memory of 3740 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 89 PID 3384 wrote to memory of 3740 3384 088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe 89 PID 3740 wrote to memory of 3428 3740 svchost.exe 55 PID 3740 wrote to memory of 3428 3740 svchost.exe 55 PID 3740 wrote to memory of 3428 3740 svchost.exe 55 PID 3740 wrote to memory of 3428 3740 svchost.exe 55 PID 3740 wrote to memory of 3428 3740 svchost.exe 55 PID 3740 wrote to memory of 3428 3740 svchost.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\088f1bece6e88c77d098f62f99d89bb9_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\file2.exeC:\Users\Admin\AppData\Local\Temp\file2.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 4764⤵
- Program crash
PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4928 -ip 49281⤵PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5d8b430edfad4e2df5918e5e22b479265
SHA1300047a4a4760cc0b5aca5471af0e8fa5fa78cc3
SHA256a39eb96feccdccb98661924182220906b77af107a78147b7777893757917914d
SHA51238aa290232060ea6f288380c8ce951320fa819e1f3c7270d0266399cd822fae226b1583e1c2a4d278b46632a4ef7cf74a1e64838944851416c56a1daeaef6387
-
Filesize
379KB
MD5a623b39e454c2350a23eedf2a98cda40
SHA1dd94807c99fdb982118059001d57f41c8eb3126d
SHA25642bc65641067d2b8c6351eed0b911a7e78f3591bb84b9f4dc5bcbd5d891158da
SHA5127522ccb274758881f0eb0ffabb939108c939d2504cd4be2954e3fef57a33543bc85c37c894eea16b212956825613e9ebb4432c34597c74455b70f1853b2698b4