Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe
-
Size
446KB
-
MD5
1527f16729683e9a8ec69967e7e3a5e5
-
SHA1
c9a0849e053dc05330eb19b5fa7233038fc9c705
-
SHA256
ce551fccb987b8017b92d87c69e099be199f156c8e8de315488bee6a598a5a32
-
SHA512
42a5fad36cb49335a0c408eeb5cc4c43bd23d3aec53b09348fea83fc92f77a32e5173922552e88e477c9058a605d64ada071c09935bb4659e119564d614f0e1b
-
SSDEEP
12288:B2zrqa33OYtZdTodzyKf1wUUzr6nLOxcpH3:B2f3bFodj+UU3cO6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2508 svchost32.exe -
Loads dropped DLL 2 IoCs
pid Process 2900 cmd.exe 2900 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Sun = "\"C:\\Windows\\system32\\svchost32.exe\"" 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svchost32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost32.exe 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe File created C:\Windows\SysWOW64\svchost32.exe 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2172 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe 2508 svchost32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2900 2172 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe 31 PID 2172 wrote to memory of 2900 2172 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe 31 PID 2172 wrote to memory of 2900 2172 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe 31 PID 2172 wrote to memory of 2900 2172 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe 31 PID 2900 wrote to memory of 2508 2900 cmd.exe 33 PID 2900 wrote to memory of 2508 2900 cmd.exe 33 PID 2900 wrote to memory of 2508 2900 cmd.exe 33 PID 2900 wrote to memory of 2508 2900 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /cC:\Windows\system32\svchost32.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\svchost32.exeC:\Windows\system32\svchost32.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD51527f16729683e9a8ec69967e7e3a5e5
SHA1c9a0849e053dc05330eb19b5fa7233038fc9c705
SHA256ce551fccb987b8017b92d87c69e099be199f156c8e8de315488bee6a598a5a32
SHA51242a5fad36cb49335a0c408eeb5cc4c43bd23d3aec53b09348fea83fc92f77a32e5173922552e88e477c9058a605d64ada071c09935bb4659e119564d614f0e1b