Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe
-
Size
450KB
-
MD5
229206674159b840bbf5aa6ad232f238
-
SHA1
91a0e5acc4ca3078be2ec9e5bbd539fae16ca35b
-
SHA256
32b870cd93337815674a72fc3d334ef4a88c05f93002bd5bf70aaaa586c80f52
-
SHA512
3910fbd13fcd12629524b99277b3dba9740a3906ccc167561967ea3dd8a7b2c8d25da6cc96965e6456beb7edc9743217a1fef8433577b73adbb15a451706ad2a
-
SSDEEP
6144:fsDtWbyJoK1nWbCbcRtmDzyn3Qo6k7UtPclWUHI8tYV:ktWbaoAntcvQnLPw7HO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2444 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 iplogger.org 7 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 2556 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2556 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2444 2708 229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2444 2708 229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2444 2708 229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2444 2708 229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe 31 PID 2444 wrote to memory of 2556 2444 cmd.exe 33 PID 2444 wrote to memory of 2556 2444 cmd.exe 33 PID 2444 wrote to memory of 2556 2444 cmd.exe 33 PID 2444 wrote to memory of 2556 2444 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-