Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe
-
Size
76KB
-
MD5
1631ebc0442e5cf82d17430040b722ed
-
SHA1
bf828880dd306b7f798504440ffaeb1e481883b5
-
SHA256
7f773a2e937933e7b42a72eb4d624186f78ac698e5d028b6d9d839b289272b02
-
SHA512
81fff9a637b7323b049521d37923bf51acdb297529f77096607bc9b02058e89b2eb0dea878e1c0914d2f282213baaaa332543a85c8afaa14db98b6fa6db94054
-
SSDEEP
1536:hipOgnbzTPaz+PK0+hy5/AvPTFWkfFezddT3ESlX3S5t9ivzCC7n+:0Znz7D5/Av8k9ezddASlX894zCC7+
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2776 idemoodp0cetka.exe 2764 idemoodp0cetka.exe -
Loads dropped DLL 3 IoCs
pid Process 2416 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 2416 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 2776 idemoodp0cetka.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2624 set thread context of 2416 2624 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 30 PID 2776 set thread context of 2764 2776 idemoodp0cetka.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idemoodp0cetka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idemoodp0cetka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2416 2624 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2416 2624 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2416 2624 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2416 2624 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2416 2624 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2416 2624 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2416 2624 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2416 2624 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 30 PID 2416 wrote to memory of 2776 2416 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2776 2416 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2776 2416 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2776 2416 1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe 31 PID 2776 wrote to memory of 2764 2776 idemoodp0cetka.exe 32 PID 2776 wrote to memory of 2764 2776 idemoodp0cetka.exe 32 PID 2776 wrote to memory of 2764 2776 idemoodp0cetka.exe 32 PID 2776 wrote to memory of 2764 2776 idemoodp0cetka.exe 32 PID 2776 wrote to memory of 2764 2776 idemoodp0cetka.exe 32 PID 2776 wrote to memory of 2764 2776 idemoodp0cetka.exe 32 PID 2776 wrote to memory of 2764 2776 idemoodp0cetka.exe 32 PID 2776 wrote to memory of 2764 2776 idemoodp0cetka.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1631ebc0442e5cf82d17430040b722ed_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD51631ebc0442e5cf82d17430040b722ed
SHA1bf828880dd306b7f798504440ffaeb1e481883b5
SHA2567f773a2e937933e7b42a72eb4d624186f78ac698e5d028b6d9d839b289272b02
SHA51281fff9a637b7323b049521d37923bf51acdb297529f77096607bc9b02058e89b2eb0dea878e1c0914d2f282213baaaa332543a85c8afaa14db98b6fa6db94054