Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 22:53
Static task
static1
Behavioral task
behavioral1
Sample
26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe
-
Size
987KB
-
MD5
26ae2c4f5a1a809e78c58ecabb1f44e0
-
SHA1
0ad6aac70983fff690f36ba25433283a8b77ebbb
-
SHA256
bcf5737101594d477fcc5eba297394104e52d866f7a5e145fa0d7b59b0be48cc
-
SHA512
71049957ff2c7d86dce6dc5d919990980014d2318f005f75f1723a582a4102643eadf533e0c2661d850327a8bd8668b8bdcaa26581fdf0fa50893cbf64df0828
-
SSDEEP
24576:+qtKfj26iTDcRm6WcDiFD+OwXlHQ3lTk4p60XSQwQ:5IriJGXC5Pg0iQwQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1548 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp 3316 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp -
Loads dropped DLL 4 IoCs
pid Process 1548 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp 1548 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp 3316 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp 3316 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\greenbb\oem.ini 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\greenbb\unins000.dat 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\greenbb\is-NIPO5.tmp 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp File created C:\Program Files (x86)\greenbb\is-1I8QH.tmp 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\greenbb\greenbb.ini 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp File created C:\Program Files (x86)\greenbb\is-VBNFI.tmp 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp File created C:\Program Files (x86)\greenbb\is-PNID1.tmp 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp File created C:\Program Files (x86)\greenbb\is-2DP5K.tmp 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp File created C:\Program Files (x86)\greenbb\unins000.dat 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp File created C:\Program Files (x86)\greenbb\is-NIPO5.tmp 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp File created C:\Program Files (x86)\greenbb\is-VT2E5.tmp 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3180 wrote to memory of 1548 3180 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe 85 PID 3180 wrote to memory of 1548 3180 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe 85 PID 3180 wrote to memory of 1548 3180 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe 85 PID 1548 wrote to memory of 4028 1548 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp 87 PID 1548 wrote to memory of 4028 1548 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp 87 PID 1548 wrote to memory of 4028 1548 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp 87 PID 4028 wrote to memory of 2308 4028 cmd.exe 89 PID 4028 wrote to memory of 2308 4028 cmd.exe 89 PID 4028 wrote to memory of 2308 4028 cmd.exe 89 PID 2308 wrote to memory of 3316 2308 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe 90 PID 2308 wrote to memory of 3316 2308 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe 90 PID 2308 wrote to memory of 3316 2308 26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\is-M1ITP.tmp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-M1ITP.tmp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp" /SL5="$5028C,754217,52224,C:\Users\Admin\AppData\Local\Temp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Users\Admin\AppData\Local\Temp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe"" /sp- /VERYSILENT /norestart3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe" /sp- /VERYSILENT /norestart4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\is-DNJJP.tmp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-DNJJP.tmp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.tmp" /SL5="$60278,754217,52224,C:\Users\Admin\AppData\Local\Temp\26ae2c4f5a1a809e78c58ecabb1f44e0_JaffaCakes118.exe" /sp- /VERYSILENT /norestart5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3316
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
707KB
MD5bf6be714c784b9157099cbc15df5b38a
SHA120303eec37cf9c7277a3f42ea4c74dc35fcb31e3
SHA25640ea597e3a3825c9ccb672f00f6229991914e03b9fd66aa7898ef3dcc255bafe
SHA512c5c8097465d1418ffc6806c0f5c4a21277042580975bc0bc1153e5245bbcfcc11ef13d6ef001a1b613910da2abdf452a5432488f7ff3fdd6ca1450006f75cb0d
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3