Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe
-
Size
170KB
-
MD5
08c2d2f29a207e73d9c813e6e01a65e8
-
SHA1
224607300d6a72977fc482ba990715bd3d5e706e
-
SHA256
cbfbf4204791f9bb1d43285e7392549f6fa8ef577e14cdc627f0cd3543cdb85e
-
SHA512
1a1d322cb76fe11cfb37d52bba96894165105796d0f9841935688cbf53222da824d19ed7d9621f52ff6ddc8dd7cafc420f4cebe8cdf25bbc9153ad6e8f282988
-
SSDEEP
3072:lol5bZnMBpg+/0Q33TWIQKWpCkXY139K6HOd5L64cs4TRRzBQI5HR4xk:O59noi+/9HT1+Ih9/Od5W48f
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\IKXGVMFZHI = "C:\\Users\\Admin\\AppData\\Local\\Temp\\08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe" 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 14344 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe 2544 08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 380 wrote to memory of 14344 380 taskeng.exe 31 PID 380 wrote to memory of 14344 380 taskeng.exe 31 PID 380 wrote to memory of 14344 380 taskeng.exe 31 PID 380 wrote to memory of 14344 380 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2544
-
C:\Windows\system32\taskeng.exetaskeng.exe {20278C0E-6289-4CDA-97AE-A88B8F8E34E6} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\08c2d2f29a207e73d9c813e6e01a65e8_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
PID:14344
-