Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe
-
Size
79KB
-
MD5
145a7f978d05cfce66c57fd1ed37b834
-
SHA1
65280c82e6098846c403895d22a5df398b5b965f
-
SHA256
758e4fd76dbf13e6df92be05f38f41ee4abcceb3dab3854e38a24e94098d2033
-
SHA512
f78741b5420b962ab5a691db2102ab0db80344b326662b9af33a897bb82a3b7bee61bc298aef7d9307b1171f3102294f3de81a701bff7c13e561705739ac3152
-
SSDEEP
1536:YetAPjtyB48P1mvwUFnToIfCfQNSDYDFiqsn:VSPkt1mvwUtTBfCfQNV8n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2772 fcwdpq.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\fcwdpq.exe 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fcwdpq.exe 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcwdpq.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2772 fcwdpq.exe -
Suspicious behavior: MapViewOfSection 49 IoCs
pid Process 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe 2772 fcwdpq.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe Token: SeDebugPrivilege 2772 fcwdpq.exe Token: SeIncBasePriorityPrivilege 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 384 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 3 PID 2648 wrote to memory of 384 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 3 PID 2648 wrote to memory of 384 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 3 PID 2648 wrote to memory of 384 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 3 PID 2648 wrote to memory of 384 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 3 PID 2648 wrote to memory of 384 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 3 PID 2648 wrote to memory of 396 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 4 PID 2648 wrote to memory of 396 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 4 PID 2648 wrote to memory of 396 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 4 PID 2648 wrote to memory of 396 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 4 PID 2648 wrote to memory of 396 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 4 PID 2648 wrote to memory of 396 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 4 PID 2648 wrote to memory of 432 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 5 PID 2648 wrote to memory of 432 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 5 PID 2648 wrote to memory of 432 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 5 PID 2648 wrote to memory of 432 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 5 PID 2648 wrote to memory of 432 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 5 PID 2648 wrote to memory of 432 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 5 PID 2648 wrote to memory of 476 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 6 PID 2648 wrote to memory of 476 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 6 PID 2648 wrote to memory of 476 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 6 PID 2648 wrote to memory of 476 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 6 PID 2648 wrote to memory of 476 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 6 PID 2648 wrote to memory of 476 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 6 PID 2648 wrote to memory of 492 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 7 PID 2648 wrote to memory of 492 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 7 PID 2648 wrote to memory of 492 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 7 PID 2648 wrote to memory of 492 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 7 PID 2648 wrote to memory of 492 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 7 PID 2648 wrote to memory of 492 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 7 PID 2648 wrote to memory of 500 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 8 PID 2648 wrote to memory of 500 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 8 PID 2648 wrote to memory of 500 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 8 PID 2648 wrote to memory of 500 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 8 PID 2648 wrote to memory of 500 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 8 PID 2648 wrote to memory of 500 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 8 PID 2648 wrote to memory of 592 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 9 PID 2648 wrote to memory of 592 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 9 PID 2648 wrote to memory of 592 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 9 PID 2648 wrote to memory of 592 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 9 PID 2648 wrote to memory of 592 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 9 PID 2648 wrote to memory of 592 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 9 PID 2648 wrote to memory of 672 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 10 PID 2648 wrote to memory of 672 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 10 PID 2648 wrote to memory of 672 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 10 PID 2648 wrote to memory of 672 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 10 PID 2648 wrote to memory of 672 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 10 PID 2648 wrote to memory of 672 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 10 PID 2648 wrote to memory of 764 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 11 PID 2648 wrote to memory of 764 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 11 PID 2648 wrote to memory of 764 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 11 PID 2648 wrote to memory of 764 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 11 PID 2648 wrote to memory of 764 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 11 PID 2648 wrote to memory of 764 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 11 PID 2648 wrote to memory of 820 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 12 PID 2648 wrote to memory of 820 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 12 PID 2648 wrote to memory of 820 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 12 PID 2648 wrote to memory of 820 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 12 PID 2648 wrote to memory of 820 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 12 PID 2648 wrote to memory of 820 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 12 PID 2648 wrote to memory of 844 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 13 PID 2648 wrote to memory of 844 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 13 PID 2648 wrote to memory of 844 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 13 PID 2648 wrote to memory of 844 2648 145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe 13
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:592
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1524
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1808
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:764
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:820
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1160
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:844
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2620
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:268
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:496
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1076
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1120
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:340
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2924
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2988
-
-
C:\Windows\SysWOW64\fcwdpq.exeC:\Windows\SysWOW64\fcwdpq.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\145a7f978d05cfce66c57fd1ed37b834_JaffaCakes118.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5145a7f978d05cfce66c57fd1ed37b834
SHA165280c82e6098846c403895d22a5df398b5b965f
SHA256758e4fd76dbf13e6df92be05f38f41ee4abcceb3dab3854e38a24e94098d2033
SHA512f78741b5420b962ab5a691db2102ab0db80344b326662b9af33a897bb82a3b7bee61bc298aef7d9307b1171f3102294f3de81a701bff7c13e561705739ac3152