Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe
-
Size
80KB
-
MD5
2675ee98e3d34824fcfc6b991202ae74
-
SHA1
a415c34eeb79018dee7f2f735d314b9d29276571
-
SHA256
f331d2eceb0eb55c0e61eda540652ace7dc67cc2670c8bbcf064b2c1f5761b91
-
SHA512
90b723a453f82ad6b4702195284be5cb00655f751b3ae51961f5c254ba37ec931a835b58c3e029b4060028fb658c4b79355db052dbbac32e199ad07794295625
-
SSDEEP
1536:nNf6YaTpokWQa+NWAKxFN1Gt5y34y0Fi95EwUU:nNPaTaH0FiLUU
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\99725.exe.exe 2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\99725.exe.exe 2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2340 2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2900 2340 2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2900 2340 2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2900 2340 2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2900 2340 2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2152 2900 net.exe 32 PID 2900 wrote to memory of 2152 2900 net.exe 32 PID 2900 wrote to memory of 2152 2900 net.exe 32 PID 2900 wrote to memory of 2152 2900 net.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2675ee98e3d34824fcfc6b991202ae74_JaffaCakes118.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\net.exenet stop wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-