Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe
-
Size
38KB
-
MD5
17ed23333d10e6fcd96782615132c7bf
-
SHA1
8c653e2804f0a5a87ba4606387203b7ec134a4cd
-
SHA256
c88aca89290edca9d5c053737e765104eb7b32063417dd8256ef2bbf52ca57c0
-
SHA512
35d7192b8ad90dfd6fa840354c57b79f8ff86953b1160ee10dddad3c7e4f085889debdf82de1400e2ab42bbf504b392807699d7ca732e3aeb7fe40e70550c432
-
SSDEEP
768:objqEFd8yMaZaqj+DQxHedPYy16QVWAGYqr55uuWE:Q/xauaE+2wxWJYMPuuF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2980 BCSSync.exe 2740 BCSSync.exe -
Loads dropped DLL 3 IoCs
pid Process 1156 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 1156 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 2980 BCSSync.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2348 set thread context of 1156 2348 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 30 PID 2980 set thread context of 2740 2980 BCSSync.exe 33 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\jgueMho3.com 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1156 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 2740 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1156 2348 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 30 PID 2348 wrote to memory of 1156 2348 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 30 PID 2348 wrote to memory of 1156 2348 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 30 PID 2348 wrote to memory of 1156 2348 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 30 PID 2348 wrote to memory of 1156 2348 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 30 PID 2348 wrote to memory of 1156 2348 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 30 PID 2348 wrote to memory of 1156 2348 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 30 PID 2348 wrote to memory of 1156 2348 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 30 PID 2348 wrote to memory of 1156 2348 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 30 PID 1156 wrote to memory of 2980 1156 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 32 PID 1156 wrote to memory of 2980 1156 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 32 PID 1156 wrote to memory of 2980 1156 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 32 PID 1156 wrote to memory of 2980 1156 17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe 32 PID 2980 wrote to memory of 2740 2980 BCSSync.exe 33 PID 2980 wrote to memory of 2740 2980 BCSSync.exe 33 PID 2980 wrote to memory of 2740 2980 BCSSync.exe 33 PID 2980 wrote to memory of 2740 2980 BCSSync.exe 33 PID 2980 wrote to memory of 2740 2980 BCSSync.exe 33 PID 2980 wrote to memory of 2740 2980 BCSSync.exe 33 PID 2980 wrote to memory of 2740 2980 BCSSync.exe 33 PID 2980 wrote to memory of 2740 2980 BCSSync.exe 33 PID 2980 wrote to memory of 2740 2980 BCSSync.exe 33 PID 2740 wrote to memory of 2832 2740 BCSSync.exe 34 PID 2740 wrote to memory of 2832 2740 BCSSync.exe 34 PID 2740 wrote to memory of 2832 2740 BCSSync.exe 34 PID 2740 wrote to memory of 2832 2740 BCSSync.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\17ed23333d10e6fcd96782615132c7bf_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5ad1876d79b132d30fe82b40a8f79b14c
SHA140fb71add90705d6ecbe64adab9bbb50a16827bd
SHA2561fec63a691917d62c1edb7bb64d3b7f7b65b2d16fd4b43492b5b972cf2e4fa63
SHA5126ff393aa1e26540ef747f98d35c481d25bfb461ff67490e37ce43b901760bebc57c9d7964880597db3c2e833a09d7f65339672326ab33592a85f2cb218994d5e