Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe
-
Size
132KB
-
MD5
179010b48b751e3fe7f069091bbc33d5
-
SHA1
a3fd84ab5322caa1a01b5c1ada47916bf5a82534
-
SHA256
b6797817295aaf52821b83780287de596fec6614ae8f1ce8aee0ad0f2f9048bb
-
SHA512
af9155a7be1873345d7cb9035aadb17a2dc79c0ba009b4063337213966708cda3262c746615b70bafc60b79de6f8262a53bcbb3a505f58052c9acbab41f353ca
-
SSDEEP
1536:yenYr5dYbuVjajSjJm95llPFct+faAoUt+Qeg6TKVbXNXaBwpkzeqHaQvMzhzYPS:hnjbSVylFctTB9utwwGraQIBYPS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2780 taskhost.exe 2840 taskhost.exe -
Loads dropped DLL 3 IoCs
pid Process 2776 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 2776 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 2780 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2676 set thread context of 2776 2676 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 30 PID 2780 set thread context of 2840 2780 taskhost.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2776 2676 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2776 2676 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2776 2676 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2776 2676 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2776 2676 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2776 2676 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2780 2776 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 31 PID 2776 wrote to memory of 2780 2776 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 31 PID 2776 wrote to memory of 2780 2776 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 31 PID 2776 wrote to memory of 2780 2776 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 31 PID 2780 wrote to memory of 2840 2780 taskhost.exe 32 PID 2780 wrote to memory of 2840 2780 taskhost.exe 32 PID 2780 wrote to memory of 2840 2780 taskhost.exe 32 PID 2780 wrote to memory of 2840 2780 taskhost.exe 32 PID 2780 wrote to memory of 2840 2780 taskhost.exe 32 PID 2780 wrote to memory of 2840 2780 taskhost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:2840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD523cf67fcb6b8b9fbd47b57035410eefc
SHA1274c260f70e9c9d12fa6edd84add7e1438726e01
SHA256697a67300f17e362b446d334ef1dcf0f24c3d62fe70b4ebe68761e2b8ec7ccad
SHA512e9f6f765c39cf64dc9fe1fd5c3bbc9f2343de72af258a0f20432633b3e01410838904db292491f7db5e5aebe628dc2c3595073a900e8e3ec637d1502b84037ad