Analysis
-
max time kernel
21s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 20:14
Behavioral task
behavioral1
Sample
24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe
-
Size
35KB
-
MD5
24d47d0a1bb446d0f7e412d90178c7d3
-
SHA1
db8a4a96bbe16f7a11f26d789c74d0855f382ed0
-
SHA256
e1a8f0816e7036ae477843560a1790275b6bb2c1c0652057eb252517238ef1f6
-
SHA512
c7e2db02d07d671a110233d759c286d9a67886b1e7cdfec0ff2bbbe16e5754516f65fe1e12aaf1b39c99399a670d702bc8dc6c062727a3c1e99444be9c99c61f
-
SSDEEP
768:BGiuyMy/9pvx7+3XngoQ85OjPRUYILYPV24Z952b+s99I5:OyMI9pvxqnC82KYIEPk4Z6xU
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\acpiec.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\pcidump.sys 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 3708 rundll32.exe 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\killkb.dll 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4176-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4176-5-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5064 sc.exe 4472 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4024 ipconfig.exe -
Kills process with taskkill 4 IoCs
pid Process 3016 taskkill.exe 3808 taskkill.exe 344 taskkill.exe 4392 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe 3708 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3808 taskkill.exe Token: SeDebugPrivilege 344 taskkill.exe Token: SeDebugPrivilege 3016 taskkill.exe Token: SeDebugPrivilege 4392 taskkill.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4176 wrote to memory of 3160 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 83 PID 4176 wrote to memory of 3160 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 83 PID 4176 wrote to memory of 3160 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 83 PID 4176 wrote to memory of 2060 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 84 PID 4176 wrote to memory of 2060 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 84 PID 4176 wrote to memory of 2060 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 84 PID 4176 wrote to memory of 3804 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 85 PID 4176 wrote to memory of 3804 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 85 PID 4176 wrote to memory of 3804 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 85 PID 4176 wrote to memory of 540 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 86 PID 4176 wrote to memory of 540 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 86 PID 4176 wrote to memory of 540 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 86 PID 4176 wrote to memory of 4692 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 88 PID 4176 wrote to memory of 4692 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 88 PID 4176 wrote to memory of 4692 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 88 PID 4176 wrote to memory of 4716 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 89 PID 4176 wrote to memory of 4716 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 89 PID 4176 wrote to memory of 4716 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 89 PID 2060 wrote to memory of 4884 2060 cmd.exe 95 PID 2060 wrote to memory of 4884 2060 cmd.exe 95 PID 2060 wrote to memory of 4884 2060 cmd.exe 95 PID 3804 wrote to memory of 4472 3804 cmd.exe 96 PID 3804 wrote to memory of 4472 3804 cmd.exe 96 PID 3804 wrote to memory of 4472 3804 cmd.exe 96 PID 3160 wrote to memory of 2532 3160 cmd.exe 97 PID 3160 wrote to memory of 2532 3160 cmd.exe 97 PID 3160 wrote to memory of 2532 3160 cmd.exe 97 PID 4692 wrote to memory of 3016 4692 cmd.exe 98 PID 4692 wrote to memory of 3016 4692 cmd.exe 98 PID 4692 wrote to memory of 3016 4692 cmd.exe 98 PID 540 wrote to memory of 3808 540 cmd.exe 99 PID 540 wrote to memory of 3808 540 cmd.exe 99 PID 540 wrote to memory of 3808 540 cmd.exe 99 PID 4716 wrote to memory of 344 4716 cmd.exe 100 PID 4716 wrote to memory of 344 4716 cmd.exe 100 PID 4716 wrote to memory of 344 4716 cmd.exe 100 PID 4176 wrote to memory of 3708 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 105 PID 4176 wrote to memory of 3708 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 105 PID 4176 wrote to memory of 3708 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 105 PID 4176 wrote to memory of 2308 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 106 PID 4176 wrote to memory of 2308 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 106 PID 4176 wrote to memory of 2308 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 106 PID 4176 wrote to memory of 3304 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 107 PID 4176 wrote to memory of 3304 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 107 PID 4176 wrote to memory of 3304 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 107 PID 2308 wrote to memory of 5064 2308 cmd.exe 110 PID 2308 wrote to memory of 5064 2308 cmd.exe 110 PID 2308 wrote to memory of 5064 2308 cmd.exe 110 PID 3304 wrote to memory of 4392 3304 cmd.exe 111 PID 3304 wrote to memory of 4392 3304 cmd.exe 111 PID 3304 wrote to memory of 4392 3304 cmd.exe 111 PID 4176 wrote to memory of 4024 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 112 PID 4176 wrote to memory of 4024 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 112 PID 4176 wrote to memory of 4024 4176 24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24d47d0a1bb446d0f7e412d90178c7d3_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32 /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32 /e /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:4884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config ekrn start= disabled2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\sc.exesc config ekrn start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4472
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im ekrn.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im ekrn.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im egui.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im egui.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im ScanFrm.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im ScanFrm.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:344
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\killkb.dll, droqp2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config avp start= disabled2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\sc.exesc config avp start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im avp.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im avp.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4024
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5590578650f9a95ae0d6a3a1a70f5be65
SHA1211523f71ad395e5f35c0f7b79c672169fb65eeb
SHA25611902d9eeeb456170e0a5070e66acf01a74631fe047d53ca83228d544cdeb0b4
SHA512cebe7d06f06a991902ef1367ae2d0fc230da46357451eb9eb4856b02c6e24f53a27d02140742b1987c0360cf7f2d1d62ad5d591c2a73feaefa6bb30491f95b54
-
Filesize
62KB
MD55804568f87e2f66265208bd3bbaeb269
SHA1b0b3eb8c9e5668b703494c4d7761104a1f5fa291
SHA256545c066bc11b25da1c100c0bf2bf908fbe1eb58bff94a56459d7e473afc78793
SHA512828453e06d49ab41d7022f7bad279cf93f7c110e41364a882db988e93f5dd7718c1c54c8675a70697df1c29be4ca444665772ebba9c3facba97975acea71032e