Analysis
-
max time kernel
142s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe
-
Size
106KB
-
MD5
214ba52c1fe0615bdf8b110de5a54800
-
SHA1
8d14c8471ad2ddea020c6283118c8031ce7f7194
-
SHA256
4a98211c5559002c943be44e52f37e9362b06f3e384625735e2170ef215c7edc
-
SHA512
d7f95da24b99e6e347cd64c508460f8b747cc110d3fef4667d59bd8894a97f72a4dab5b11b9f48649185f0248170b38b77ab5ae3d21da2d9665cbd347d763599
-
SSDEEP
1536:pDfF/yYugpJ+BsxKlb0Tz7OOFGHWy4TmQsdLB8Hdez8VmF2jbxWGq6:pDf1y0pJTxKZUOOcICBU+QS2jbxWGq
Malware Config
Extracted
tofsee
91.218.38.211
188.130.237.71
185.25.48.10
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2580 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
fsxkpcvd.exepid process 692 fsxkpcvd.exe -
Loads dropped DLL 2 IoCs
Processes:
214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exepid process 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\fsxkpcvd.exe\"" 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fsxkpcvd.exedescription pid process target process PID 692 set thread context of 1104 692 fsxkpcvd.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exefsxkpcvd.exesvchost.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsxkpcvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exefsxkpcvd.exepid process 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe 692 fsxkpcvd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exefsxkpcvd.exedescription pid process target process PID 1292 wrote to memory of 692 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe fsxkpcvd.exe PID 1292 wrote to memory of 692 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe fsxkpcvd.exe PID 1292 wrote to memory of 692 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe fsxkpcvd.exe PID 1292 wrote to memory of 692 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe fsxkpcvd.exe PID 692 wrote to memory of 1104 692 fsxkpcvd.exe svchost.exe PID 692 wrote to memory of 1104 692 fsxkpcvd.exe svchost.exe PID 692 wrote to memory of 1104 692 fsxkpcvd.exe svchost.exe PID 692 wrote to memory of 1104 692 fsxkpcvd.exe svchost.exe PID 692 wrote to memory of 1104 692 fsxkpcvd.exe svchost.exe PID 692 wrote to memory of 1104 692 fsxkpcvd.exe svchost.exe PID 1292 wrote to memory of 2580 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe cmd.exe PID 1292 wrote to memory of 2580 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe cmd.exe PID 1292 wrote to memory of 2580 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe cmd.exe PID 1292 wrote to memory of 2580 1292 214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\fsxkpcvd.exe"C:\Users\Admin\fsxkpcvd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1148.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5631dba645b394f476070d8122c086310
SHA121e58377c08cd2426b2f60207f9db84ef4b90aa9
SHA256775f1519414f738178a0c108ff7e944b4ee8192bd274ff7dc6ea415cce47aa0c
SHA5127e3d4f59ff2e1b05ec0fb57661a2b3d30279e94dc5aa77e99915f7391224e85fccc3ddbd9e169d01c9422dbdb5eb81ba9fd82a85cba1070cb0ae5def994028c7
-
Filesize
35.5MB
MD5126a5c2864743433b721999d57de2fa6
SHA1b301bd6c8822bdc2dddde524d861668962a87417
SHA2561586c6456b7e36489d405739204e50ca13660994a1feaa5aefe22f7cca0d4237
SHA5125bbf7168caefd6bffc27a9be686e2083ce334b4aaea583c8a06b10c889e1c88837f420b6aeab5b266aa2950ab13541c27fa1ed20829550daa9cf5500065894ca