Analysis
-
max time kernel
94s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe
-
Size
42KB
-
MD5
106890fee6d3fd9855ef37ac737edec4
-
SHA1
e79d03e59ffc8d8e9778333587ef6666469fa56e
-
SHA256
6d1f83c09e103966f9a1f36794a5e48982eb04fb1f64fcf889eb93f549f37840
-
SHA512
06b5cfb94fa61b1b7e35a6d1eec6db9052137419cc9168c17f1022cee0ee52e801022c482e8fa4c5a3097b8cab36e3d9c728c787c35e25f494ef1fd3350cd8de
-
SSDEEP
768:NHlTrJF8RWmixDuct6CLHyopoToJSOx62LsNNAjpk:NFXJF8exDNthzwY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1516 WinHelp32.exe 776 WinHelp32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 776 set thread context of 2916 776 WinHelp32.exe 85 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\WinHelp32.exe 106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe File opened for modification C:\Program Files\Internet Explorer\WinHelp32.exe 106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4000 2916 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelp32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4108 106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4108 wrote to memory of 1516 4108 106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe 82 PID 4108 wrote to memory of 1516 4108 106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe 82 PID 4108 wrote to memory of 1516 4108 106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe 82 PID 4108 wrote to memory of 2500 4108 106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe 83 PID 4108 wrote to memory of 2500 4108 106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe 83 PID 4108 wrote to memory of 2500 4108 106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe 83 PID 776 wrote to memory of 2916 776 WinHelp32.exe 85 PID 776 wrote to memory of 2916 776 WinHelp32.exe 85 PID 776 wrote to memory of 2916 776 WinHelp32.exe 85 PID 776 wrote to memory of 2916 776 WinHelp32.exe 85 PID 776 wrote to memory of 2916 776 WinHelp32.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\106890fee6d3fd9855ef37ac737edec4_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files\Internet Explorer\WinHelp32.exe"C:\Program Files\Internet Explorer\WinHelp32.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Users\Admin\AppData\Local\Temp\106890~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2500
-
-
C:\Program Files\Internet Explorer\WinHelp32.exe"C:\Program Files\Internet Explorer\WinHelp32.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe2⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 123⤵
- Program crash
PID:4000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2916 -ip 29161⤵PID:968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5106890fee6d3fd9855ef37ac737edec4
SHA1e79d03e59ffc8d8e9778333587ef6666469fa56e
SHA2566d1f83c09e103966f9a1f36794a5e48982eb04fb1f64fcf889eb93f549f37840
SHA51206b5cfb94fa61b1b7e35a6d1eec6db9052137419cc9168c17f1022cee0ee52e801022c482e8fa4c5a3097b8cab36e3d9c728c787c35e25f494ef1fd3350cd8de