Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe
-
Size
714KB
-
MD5
0aecfdf22ef2a94829f593f853cd09ed
-
SHA1
d13ce7d6d1ba14d8aba21a5f075149595730a05e
-
SHA256
db413ef066d2343a3ffc234074843542d6b463cbe44ef292e0eb7d31ce6613d3
-
SHA512
f1652300f3cc6e553283bdb268f4570ccc1f81ef3d65273516fcced7d2b63d2f359093dc2aa87e688128d79c582eb7517e9d7b4fdd404dc573403be845846161
-
SSDEEP
12288:yG+0msW40OZoiMXD+WuDNikChfzKFAtihxzxfs+g8F3Z4mxxR0MHoTAFb2:ySms31o/T+Wu9ChEMarg8QmXRKR
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2872 20D0A6~1.EXE 2772 Hacker.com.cn.exe -
Loads dropped DLL 2 IoCs
pid Process 2532 0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe 2532 0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Hacker.com.cn.exe 20D0A6~1.EXE File created C:\Windows\Hacker.com.cn.exe 20D0A6~1.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20D0A6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2872 20D0A6~1.EXE Token: SeDebugPrivilege 2772 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2872 2532 0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2872 2532 0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2872 2532 0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2872 2532 0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2768 2772 Hacker.com.cn.exe 32 PID 2772 wrote to memory of 2768 2772 Hacker.com.cn.exe 32 PID 2772 wrote to memory of 2768 2772 Hacker.com.cn.exe 32 PID 2772 wrote to memory of 2768 2772 Hacker.com.cn.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0aecfdf22ef2a94829f593f853cd09ed_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\20D0A6~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\20D0A6~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
343KB
MD502b0fa2127ec5a44fc8e44aef38826fc
SHA17c6b12b7ee23183c74bfac3a6cc3f215ee727ede
SHA256693906ee6d80937cba4a8d28aafc3f3e94cb3484afa484d42804a69381735e62
SHA512a0e656e760f616d21b56b4456d21ab9e5c9e35df5146b72fbba2198fa9ca99530f9528b1a36e3c8933af73aeb05a27300d6868fc20fad0dc72cfc95e5973930d