Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe
-
Size
132KB
-
MD5
179010b48b751e3fe7f069091bbc33d5
-
SHA1
a3fd84ab5322caa1a01b5c1ada47916bf5a82534
-
SHA256
b6797817295aaf52821b83780287de596fec6614ae8f1ce8aee0ad0f2f9048bb
-
SHA512
af9155a7be1873345d7cb9035aadb17a2dc79c0ba009b4063337213966708cda3262c746615b70bafc60b79de6f8262a53bcbb3a505f58052c9acbab41f353ca
-
SSDEEP
1536:yenYr5dYbuVjajSjJm95llPFct+faAoUt+Qeg6TKVbXNXaBwpkzeqHaQvMzhzYPS:hnjbSVylFctTB9utwwGraQIBYPS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4464 taskhost.exe 3388 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2124 set thread context of 4084 2124 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 85 PID 4464 set thread context of 3388 4464 taskhost.exe 90 -
Program crash 2 IoCs
pid pid_target Process procid_target 2756 2124 WerFault.exe 84 3628 4464 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2124 wrote to memory of 4084 2124 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 85 PID 2124 wrote to memory of 4084 2124 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 85 PID 2124 wrote to memory of 4084 2124 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 85 PID 2124 wrote to memory of 4084 2124 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 85 PID 2124 wrote to memory of 4084 2124 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 85 PID 4084 wrote to memory of 4464 4084 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 87 PID 4084 wrote to memory of 4464 4084 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 87 PID 4084 wrote to memory of 4464 4084 179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe 87 PID 4464 wrote to memory of 3388 4464 taskhost.exe 90 PID 4464 wrote to memory of 3388 4464 taskhost.exe 90 PID 4464 wrote to memory of 3388 4464 taskhost.exe 90 PID 4464 wrote to memory of 3388 4464 taskhost.exe 90 PID 4464 wrote to memory of 3388 4464 taskhost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\179010b48b751e3fe7f069091bbc33d5_JaffaCakes118.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 3084⤵
- Program crash
PID:3628
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 3082⤵
- Program crash
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2124 -ip 21241⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4464 -ip 44641⤵PID:3412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD523cf67fcb6b8b9fbd47b57035410eefc
SHA1274c260f70e9c9d12fa6edd84add7e1438726e01
SHA256697a67300f17e362b446d334ef1dcf0f24c3d62fe70b4ebe68761e2b8ec7ccad
SHA512e9f6f765c39cf64dc9fe1fd5c3bbc9f2343de72af258a0f20432633b3e01410838904db292491f7db5e5aebe628dc2c3595073a900e8e3ec637d1502b84037ad