Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe
-
Size
931KB
-
MD5
09081d5172239b8cf543ec1dba6e27db
-
SHA1
ea1875ea4c68010760849e76c438113d51f45433
-
SHA256
7ee2eb17b15569b926f6040aa060be3adaddf928bae3c95a1c53ab53aad12a68
-
SHA512
8339db0c424d1dc85469317034207a604d079a9874b018620a2e7adfcb88364d416eebd3e84ca5202b6e4b8c0574d020e121c3d98f11ea14f9239f1f62fe4923
-
SSDEEP
24576:YhzndzaI7+3XE97i0CFZUnJSLQ4WRvE/DvgipFQ3:YHaU20M+JwQ4WKW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2808 SKELETON..EXE 2680 SKELETON.EXE -
resource yara_rule behavioral1/files/0x000800000001658c-9.dat vmprotect behavioral1/memory/2808-19-0x0000000013150000-0x00000000131EA000-memory.dmp vmprotect behavioral1/memory/2656-12-0x0000000013150000-0x00000000131EA000-memory.dmp vmprotect behavioral1/memory/2808-25-0x0000000013150000-0x00000000131EA000-memory.dmp vmprotect behavioral1/memory/2808-30-0x0000000013150000-0x00000000131EA000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Name_Me_Please = "C:\\Windows\\SKELETON..EXE" SKELETON..EXE -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2656 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe 2808 SKELETON..EXE -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\CSKELETON..EXE 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe File created C:\Windows\SKELETON..EXE 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe File created C:\Windows\CSKELETON.EXE 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe File created C:\Windows\SKELETON.EXE 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKELETON..EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKELETON.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 SKELETON.EXE -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2680 SKELETON.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2808 2656 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2808 2656 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2808 2656 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2808 2656 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2680 2656 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe 31 PID 2656 wrote to memory of 2680 2656 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe 31 PID 2656 wrote to memory of 2680 2656 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe 31 PID 2656 wrote to memory of 2680 2656 09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2716 2808 SKELETON..EXE 32 PID 2808 wrote to memory of 2716 2808 SKELETON..EXE 32 PID 2808 wrote to memory of 2716 2808 SKELETON..EXE 32 PID 2808 wrote to memory of 2716 2808 SKELETON..EXE 32 PID 2808 wrote to memory of 2716 2808 SKELETON..EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\09081d5172239b8cf543ec1dba6e27db_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SKELETON..EXE"C:\Windows\SKELETON..EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\windows\notepad.exeC:\windows\notepad.exe3⤵PID:2716
-
-
-
C:\Windows\SKELETON.EXE"C:\Windows\SKELETON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD532b679de4b536e2dcdf726fe0431e8cc
SHA14434cdc657d4369ae34fd1d8596b3cf643743aac
SHA2560ef8409b5335136fad342b69eac1632b74d1f77d5b405509b629932a0c670612
SHA512684e06f906fca33c07d70478ba400b133c203558775cbb235abc575d7e937c91f30b3b703f9da96fc322e1f2b275109ac35b9228d22557068d95d6732fec05f1
-
Filesize
63KB
MD5a5cde4509286585c16e8def01750f804
SHA1f4009335f1197032b970e28e6ecd15de65f02343
SHA256fbfc0a549aa4e5197228a78a2d1c7f8cc68b04203389d7afb3fdc87c3d137751
SHA512805b09362d5d65b1151cdcb68e8b54fdf99d38c26c22e08c83bca0dfe0bf66a59638414f8aa62b4cdcd939f8ecb97f093247642b89f054e4cc15e82075241049