Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe
-
Size
29KB
-
MD5
0a51c0a0fed6e716db219f51a20601cb
-
SHA1
d7e829d27ebf8f31310bdb8a3cb3f0deaee93c3d
-
SHA256
bd908235b7a22d5594b920c79c9b232f097b72ac404f5643c404a52c2e570b6f
-
SHA512
a2abf0b38d70bf975149a5399154e4bb1ba16960061840ccea5e00b853e24b98ed196fef12bfc620d8902755dee87ac3edbd9a216263cc353f5c6733b158304f
-
SSDEEP
384:Y4YrQkGxhMRN5Z9ST8QyApk1jA/YYJLW7wycJbg+:YtqMRTm8QDQjA/tLhbB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exeC:\\Windows\\Googlemt.exe" Googlemt.exe -
Deletes itself 1 IoCs
pid Process 2864 Googlemt.exe -
Executes dropped EXE 2 IoCs
pid Process 2844 Googlemt.exe 2864 Googlemt.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Debugs.inf 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe File created C:\Windows\Googlemt.exe 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe File opened for modification C:\Windows\Googlemt.exe 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe File created C:\Windows\Debugs.inf Googlemt.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Googlemt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Googlemt.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2148 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 2184 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 2844 Googlemt.exe 2864 Googlemt.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2184 2148 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2184 2148 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2184 2148 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2184 2148 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2184 2148 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2184 2148 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2184 2148 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2844 2184 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 32 PID 2184 wrote to memory of 2844 2184 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 32 PID 2184 wrote to memory of 2844 2184 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 32 PID 2184 wrote to memory of 2844 2184 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 32 PID 2184 wrote to memory of 2844 2184 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 32 PID 2184 wrote to memory of 2844 2184 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 32 PID 2184 wrote to memory of 2844 2184 0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe 32 PID 2844 wrote to memory of 2864 2844 Googlemt.exe 33 PID 2844 wrote to memory of 2864 2844 Googlemt.exe 33 PID 2844 wrote to memory of 2864 2844 Googlemt.exe 33 PID 2844 wrote to memory of 2864 2844 Googlemt.exe 33 PID 2844 wrote to memory of 2864 2844 Googlemt.exe 33 PID 2844 wrote to memory of 2864 2844 Googlemt.exe 33 PID 2844 wrote to memory of 2864 2844 Googlemt.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a51c0a0fed6e716db219f51a20601cb_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\Googlemt.exe"C:\Windows\Googlemt.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\Googlemt.exe"C:\Windows\Googlemt.exe"4⤵
- Modifies WinLogon for persistence
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD57e71d6e1b70443bcbf9d4f328ce1f3f6
SHA1cb934ed847d5874ac93e0501abf0f38207f7185f
SHA256e2dcfd5d2d5553982832e3b418b2b13eb063183d4a251b974a1661a37bfed580
SHA512e91fe4d86dec4ad4691837fe919109da62e276165f3ba75a363c1892782be7ecd78ff2942620675fc85a83dc47ecfb482f217a5893d4bb485320496e6b870b22
-
Filesize
7.6MB
MD5576e3093f4d759a895fb9bd710231065
SHA17d664d93915f9111c76f21a1e8203a6e2fd8d3ef
SHA256d1a53488d07001447299bfa13465604f8d6b2ec2e47569f2f00b24815336abe6
SHA512f3b24699567937b918a73f9e343121f4a87c8b5bce9c30068ac3440ed5c9e43d7f3258d7cfebb1425520e134a5c69221c241d5beddd0401692f7317a60249ed2