Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe
-
Size
131KB
-
MD5
16afad42707cb37c2cbdd212a8a34110
-
SHA1
8ae30baa8ed423a35febd8365728bb141d7d9cf4
-
SHA256
83acea22c94f00bb9e9540a93fff5949c9b0c4ab2a19511fabbb4ecf4a0adffa
-
SHA512
48a6eb4932830266b2230f93231fc4bb8d6582fdd826dc532b19f43db0740ed9000400c95817f3f11c29e7781ba323ca0c3c33a1c7d164cf4c01bdacf4f0e96b
-
SSDEEP
1536:yqP+5FxBEaK6wkpyUzpEqDrSxezb9AtnHPJ3hNs7izVJBvSqmHvJTMzUQgpEXXDg:yB5ixQpLDLzZAdF7ztvSjpydgarH
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2524 netsh.exe -
Deletes itself 1 IoCs
pid Process 2340 EXPLORER.EXE -
Loads dropped DLL 1 IoCs
pid Process 2340 EXPLORER.EXE -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPLORER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPLORER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2100 16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2340 2100 16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2340 2100 16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2340 2100 16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2340 2100 16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2524 2340 EXPLORER.EXE 31 PID 2340 wrote to memory of 2524 2340 EXPLORER.EXE 31 PID 2340 wrote to memory of 2524 2340 EXPLORER.EXE 31 PID 2340 wrote to memory of 2524 2340 EXPLORER.EXE 31 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32 PID 2340 wrote to memory of 2576 2340 EXPLORER.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16afad42707cb37c2cbdd212a8a34110_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\syswow64\EXPLORER.EXEC:\Windows\syswow64\EXPLORER.EXE2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\syswow64\netsh.exenetsh firewall add allowedprogram program = "C:\Windows\syswow64\EXPLORER.EXE" name = "Windows Explorer" mode = ENABLE scope = ALL profile = ALL3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\syswow64\EXPLORER.EXEC:\Windows\syswow64\EXPLORER.EXE3⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD516afad42707cb37c2cbdd212a8a34110
SHA18ae30baa8ed423a35febd8365728bb141d7d9cf4
SHA25683acea22c94f00bb9e9540a93fff5949c9b0c4ab2a19511fabbb4ecf4a0adffa
SHA51248a6eb4932830266b2230f93231fc4bb8d6582fdd826dc532b19f43db0740ed9000400c95817f3f11c29e7781ba323ca0c3c33a1c7d164cf4c01bdacf4f0e96b
-
Filesize
131KB
MD5b1eac3735c78c4cad6e848bc4e792e06
SHA1a50b93d07aa960153256e23185c34bc596188160
SHA256a38d19a7b6fe36078ee4e597aa33acbbc6b6f58042f94cf8f493349e65f09069
SHA5125129ddf024509c9e144a76c0620e781d689b82515ec05178154fee3496c9428e1a5b296eae8f5aa8b8ccd1b792e4de47406cf2221129b903d19e6b663cf9ecdb