Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe
-
Size
88KB
-
MD5
0c7bbadb285e550738f8bc8cc2538454
-
SHA1
4786ba9c35a7e4fa640236896042283726d1df3c
-
SHA256
d2c07679857fa07fd865c4da8a2382fe3510e10d43dee45879921cf42719ee65
-
SHA512
4ce16b1526901298de4dada8adf80cb169ac955e8aaddef2b6ab86481876945b5fcfc0870be1673473d2f8e04ca683937ebbdb6a484187e63193e8c84f18feaf
-
SSDEEP
1536:XNo+6eDN+OkCIrM6W1Nn3U5Ei6U65PuN3IW4mpUvg1bRhzYr6YVcpmgjq+oDapB:XNweDNxkCIFW/32SkN3IlmpMIbnzk6YY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5020 cadm.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\0E57AC1E.tmp 0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\0E57AC1E.tmp 0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe File created C:\Windows\SysWOW64\tdbg.uce cadm.exe File created C:\Windows\SysWOW64\0E57ACAB.tmp cadm.exe File opened for modification C:\Windows\SysWOW64\0E57ACAB.tmp cadm.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cadm.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5020 wrote to memory of 3668 5020 cadm.exe 83 PID 5020 wrote to memory of 3668 5020 cadm.exe 83 PID 5020 wrote to memory of 3668 5020 cadm.exe 83 PID 3028 wrote to memory of 3532 3028 0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe 84 PID 3028 wrote to memory of 3532 3028 0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe 84 PID 3028 wrote to memory of 3532 3028 0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\\temp_240626859.bat "C:\Users\Admin\AppData\Local\Temp\0c7bbadb285e550738f8bc8cc2538454_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3532
-
-
C:\Windows\SysWOW64\cadm.exeC:\Windows\SysWOW64\cadm.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵PID:3668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51B
MD5f04f494168326c65a3f1da7069a5dafc
SHA1ecf8b7aeb4953bcdd9e0818cc30ffada99602035
SHA256d594a84d1cec28d0e9e3833eef9e693873e9acfc0444749d791a66b2717aede1
SHA512e5a54a341eb3029dc8d1393c2e8957881f95f4ba41998ef439dd3a67841ab083f275c3d670780cf69efa90b342321fddf8bb0addc93042f2fc0d66d9b9bbac94
-
Filesize
65KB
MD5fa2f252f54b4729d1264c02ee7282a84
SHA11ff07bf1838ca12e613667c3cc8c700c48755e56
SHA256b9f11fa23e25abeca3e0c0a062814623cbe4800730dc95720ad3bfbdceb9baa1
SHA5121d2a51f6d4e71a93b9e22cb0c90140eafde586bd74c6c5bba433742475a02ac8928d1ed39b7f9a26aced7ea49b556c0544a1a0592d130caefdfd2708c438caf8