Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
08c57f092085912b8ec38de162499a16_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08c57f092085912b8ec38de162499a16_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08c57f092085912b8ec38de162499a16_JaffaCakes118.exe
-
Size
336KB
-
MD5
08c57f092085912b8ec38de162499a16
-
SHA1
b6379456ac7e574265b58485b43a906adc885e60
-
SHA256
032faeb2aed16cff13f7460117451b9bb6c8308da7dafbcafaad5574b4fbe160
-
SHA512
e384655c7250550e9112e026531ebc4f503fabfc1dfc6a44e8fc71b9ccb5aad12da3adb7cad59e924bd2615d955664e703334db6454895b9ddbf58ff31498f4a
-
SSDEEP
6144:02jyb9H98XKAw7GIUewLYlQ0g2vk/O9OHSYqZCAg5wkYGv1NVldoqmeFqH0:0Gyb198XK3Gnfr0g2VOy5ZCAmwgHdAei
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\beep.sys 08c57f092085912b8ec38de162499a16_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3508 lamss.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3508 set thread context of 1796 3508 lamss.exe 90 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\lamss.exe 08c57f092085912b8ec38de162499a16_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2384 1796 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08c57f092085912b8ec38de162499a16_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lamss.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3508 wrote to memory of 1796 3508 lamss.exe 90 PID 3508 wrote to memory of 1796 3508 lamss.exe 90 PID 3508 wrote to memory of 1796 3508 lamss.exe 90 PID 3508 wrote to memory of 1796 3508 lamss.exe 90 PID 3508 wrote to memory of 1796 3508 lamss.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\08c57f092085912b8ec38de162499a16_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08c57f092085912b8ec38de162499a16_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2388
-
C:\Windows\lamss.exeC:\Windows\lamss.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe" 121232⤵PID:1796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 123⤵
- Program crash
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1796 -ip 17961⤵PID:3168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4464,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4028 /prefetch:81⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD508c57f092085912b8ec38de162499a16
SHA1b6379456ac7e574265b58485b43a906adc885e60
SHA256032faeb2aed16cff13f7460117451b9bb6c8308da7dafbcafaad5574b4fbe160
SHA512e384655c7250550e9112e026531ebc4f503fabfc1dfc6a44e8fc71b9ccb5aad12da3adb7cad59e924bd2615d955664e703334db6454895b9ddbf58ff31498f4a