Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe
-
Size
93KB
-
MD5
25ec7bc83646129d0954a3b66df90831
-
SHA1
b2ae78deb90c0854be749bf5b87d02f92c480083
-
SHA256
305d4a8940fafcbbea69953d2331f5d32eccb57f4ed86b5068195763c429e70c
-
SHA512
38c32444bcf984fc21b28e9090e061f4d168c0be690b2e3275c6ad69f6b2a5b886583232b1537740360ede6a30978e9c1d80a777c2504fab1c87002163d91648
-
SSDEEP
1536:F3xa6sMWEdTp18p3qZYMedp9bdDkasbKm3xf6VpcI0nYDWRhXgXl:FhVdN189qZYM0GaRm3FQpuYDWvXgV
Malware Config
Extracted
tofsee
185.4.227.76
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2096 rrazlxkm.exe 2288 rrazlxkm.exe -
Loads dropped DLL 3 IoCs
pid Process 2376 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 2376 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 2096 rrazlxkm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\rrazlxkm.exe\"" 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2548 set thread context of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2096 set thread context of 2288 2096 rrazlxkm.exe 32 PID 2288 set thread context of 3012 2288 rrazlxkm.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrazlxkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrazlxkm.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2376 2548 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2096 2376 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2096 2376 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2096 2376 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2096 2376 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 31 PID 2096 wrote to memory of 2288 2096 rrazlxkm.exe 32 PID 2096 wrote to memory of 2288 2096 rrazlxkm.exe 32 PID 2096 wrote to memory of 2288 2096 rrazlxkm.exe 32 PID 2096 wrote to memory of 2288 2096 rrazlxkm.exe 32 PID 2096 wrote to memory of 2288 2096 rrazlxkm.exe 32 PID 2096 wrote to memory of 2288 2096 rrazlxkm.exe 32 PID 2096 wrote to memory of 2288 2096 rrazlxkm.exe 32 PID 2096 wrote to memory of 2288 2096 rrazlxkm.exe 32 PID 2096 wrote to memory of 2288 2096 rrazlxkm.exe 32 PID 2096 wrote to memory of 2288 2096 rrazlxkm.exe 32 PID 2288 wrote to memory of 3012 2288 rrazlxkm.exe 33 PID 2288 wrote to memory of 3012 2288 rrazlxkm.exe 33 PID 2288 wrote to memory of 3012 2288 rrazlxkm.exe 33 PID 2288 wrote to memory of 3012 2288 rrazlxkm.exe 33 PID 2288 wrote to memory of 3012 2288 rrazlxkm.exe 33 PID 2288 wrote to memory of 3012 2288 rrazlxkm.exe 33 PID 2376 wrote to memory of 2764 2376 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 34 PID 2376 wrote to memory of 2764 2376 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 34 PID 2376 wrote to memory of 2764 2376 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 34 PID 2376 wrote to memory of 2764 2376 25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25ec7bc83646129d0954a3b66df90831_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\rrazlxkm.exe"C:\Users\Admin\rrazlxkm.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\rrazlxkm.exe"C:\Users\Admin\rrazlxkm.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1884.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5a70b6b1876dccb7a8c04f6d34677de8d
SHA1d282fdc54fd7ee8719734ae3ae6edb07a507e04c
SHA256a266cce8cb331a97d78f94654800a44f28acc026d43a8243347a27024d36c31f
SHA512cf1de41814db323a3f9d4231da30f11ba5f49b43c36d972d25af6af7329bad59e797d3389174398f4cdaca21e4accdde343deca900232e739bcb35fbb42c61c9
-
Filesize
93KB
MD525ec7bc83646129d0954a3b66df90831
SHA1b2ae78deb90c0854be749bf5b87d02f92c480083
SHA256305d4a8940fafcbbea69953d2331f5d32eccb57f4ed86b5068195763c429e70c
SHA51238c32444bcf984fc21b28e9090e061f4d168c0be690b2e3275c6ad69f6b2a5b886583232b1537740360ede6a30978e9c1d80a777c2504fab1c87002163d91648