Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 21:21
Behavioral task
behavioral1
Sample
259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe
-
Size
34KB
-
MD5
259fc24e5c64c722ffd58f0d9672a6bc
-
SHA1
d12e428dd73aa7ea3a2e44b706033d0714cd9bfa
-
SHA256
f15ee940b81092ac8e1815b6abdd6285138995b76f1aa1980a1e24ad707fd8a7
-
SHA512
222a5130d1bee3bd3b588c1d3f90fc1be5898bd4a60fd4a5ddc485ca32d2eb544382b71cd026d62f12c3ceb1bf162d6e11325a224265fbbc9892fd93f33f095b
-
SSDEEP
768:gwgpGhJLzu4QhHHZxojWnC8GPKLGbuiSfxz6nbcuyD7U:Pgpm3u4QHnoyC4LvNfYnouy8
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\iqdgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2jwy03e.exe" 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 2jwy03e.exe -
Deletes itself 1 IoCs
pid Process 2448 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2576 2jwy03e.exe 1696 2jwy03e.exe 696 2jwy03e.exe -
Loads dropped DLL 4 IoCs
pid Process 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 2576 2jwy03e.exe 2576 2jwy03e.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\gr8hvqw.log 2jwy03e.exe File opened for modification C:\Windows\SysWOW64\gr8hvqw.log 2jwy03e.exe -
resource yara_rule behavioral1/memory/1608-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x0009000000015d03-7.dat upx behavioral1/memory/1608-24-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2576-29-0x0000000005DE0000-0x0000000005E04000-memory.dmp upx behavioral1/memory/2576-34-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1696-37-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1696-42-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2576-45-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2576-57-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/696-58-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/696-63-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2576-68-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2044 sc.exe 1664 sc.exe 1648 sc.exe 1524 sc.exe 2676 sc.exe 2592 sc.exe 2672 sc.exe 784 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2jwy03e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2jwy03e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2jwy03e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main 2jwy03e.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main 2jwy03e.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main 2jwy03e.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 2576 2jwy03e.exe 2576 2jwy03e.exe 2576 2jwy03e.exe 1696 2jwy03e.exe 1696 2jwy03e.exe 1696 2jwy03e.exe 696 2jwy03e.exe 696 2jwy03e.exe 696 2jwy03e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1608 wrote to memory of 2588 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 29 PID 1608 wrote to memory of 2588 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 29 PID 1608 wrote to memory of 2588 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 29 PID 1608 wrote to memory of 2588 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 29 PID 1608 wrote to memory of 2592 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 31 PID 1608 wrote to memory of 2592 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 31 PID 1608 wrote to memory of 2592 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 31 PID 1608 wrote to memory of 2592 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 31 PID 1608 wrote to memory of 2684 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 32 PID 1608 wrote to memory of 2684 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 32 PID 1608 wrote to memory of 2684 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 32 PID 1608 wrote to memory of 2684 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 32 PID 1608 wrote to memory of 2672 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 34 PID 1608 wrote to memory of 2672 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 34 PID 1608 wrote to memory of 2672 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 34 PID 1608 wrote to memory of 2672 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 34 PID 1608 wrote to memory of 2576 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 37 PID 1608 wrote to memory of 2576 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 37 PID 1608 wrote to memory of 2576 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 37 PID 1608 wrote to memory of 2576 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 37 PID 2684 wrote to memory of 2812 2684 net.exe 38 PID 2684 wrote to memory of 2812 2684 net.exe 38 PID 2684 wrote to memory of 2812 2684 net.exe 38 PID 2684 wrote to memory of 2812 2684 net.exe 38 PID 2588 wrote to memory of 2468 2588 net.exe 39 PID 2588 wrote to memory of 2468 2588 net.exe 39 PID 2588 wrote to memory of 2468 2588 net.exe 39 PID 2588 wrote to memory of 2468 2588 net.exe 39 PID 1608 wrote to memory of 2448 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 40 PID 1608 wrote to memory of 2448 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 40 PID 1608 wrote to memory of 2448 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 40 PID 1608 wrote to memory of 2448 1608 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 40 PID 2576 wrote to memory of 1108 2576 2jwy03e.exe 42 PID 2576 wrote to memory of 1108 2576 2jwy03e.exe 42 PID 2576 wrote to memory of 1108 2576 2jwy03e.exe 42 PID 2576 wrote to memory of 1108 2576 2jwy03e.exe 42 PID 2576 wrote to memory of 784 2576 2jwy03e.exe 43 PID 2576 wrote to memory of 784 2576 2jwy03e.exe 43 PID 2576 wrote to memory of 784 2576 2jwy03e.exe 43 PID 2576 wrote to memory of 784 2576 2jwy03e.exe 43 PID 2576 wrote to memory of 1244 2576 2jwy03e.exe 45 PID 2576 wrote to memory of 1244 2576 2jwy03e.exe 45 PID 2576 wrote to memory of 1244 2576 2jwy03e.exe 45 PID 2576 wrote to memory of 1244 2576 2jwy03e.exe 45 PID 2576 wrote to memory of 2044 2576 2jwy03e.exe 46 PID 2576 wrote to memory of 2044 2576 2jwy03e.exe 46 PID 2576 wrote to memory of 2044 2576 2jwy03e.exe 46 PID 2576 wrote to memory of 2044 2576 2jwy03e.exe 46 PID 2576 wrote to memory of 1696 2576 2jwy03e.exe 47 PID 2576 wrote to memory of 1696 2576 2jwy03e.exe 47 PID 2576 wrote to memory of 1696 2576 2jwy03e.exe 47 PID 2576 wrote to memory of 1696 2576 2jwy03e.exe 47 PID 1108 wrote to memory of 2732 1108 net.exe 51 PID 1108 wrote to memory of 2732 1108 net.exe 51 PID 1108 wrote to memory of 2732 1108 net.exe 51 PID 1108 wrote to memory of 2732 1108 net.exe 51 PID 1244 wrote to memory of 1604 1244 net.exe 52 PID 1244 wrote to memory of 1604 1244 net.exe 52 PID 1244 wrote to memory of 1604 1244 net.exe 52 PID 1244 wrote to memory of 1604 1244 net.exe 52 PID 1696 wrote to memory of 1208 1696 2jwy03e.exe 53 PID 1696 wrote to memory of 1208 1696 2jwy03e.exe 53 PID 1696 wrote to memory of 1208 1696 2jwy03e.exe 53 PID 1696 wrote to memory of 1208 1696 2jwy03e.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\2jwy03e.exeC:\Users\Admin\AppData\Local\Temp\2jwy03e.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:784
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\2jwy03e.exeC:\Users\Admin\AppData\Local\Temp\2jwy03e.exe -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⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"5⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
C:\Users\Admin\AppData\Local\Temp\2jwy03e.exeC:\Users\Admin\AppData\Local\Temp\2jwy03e.exe -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⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:696 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"5⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\91f92cj7.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD5d336ed97b14afcf34006cb9a58a09576
SHA177af35ac97f63d42aefb1f336eacf8dadc25b47f
SHA256c5fae6de73e5f2c73df13ea2163ff45bc5cee0e516fc62216adbe5aa37c9ca52
SHA512647a8279d28c1b22217e641a127983a3bf527d96c33426d45e897fa0da94393fedea67e311595b67f967dbf8bc6b9ba1400f03ac11257cd3ce4073c24588cbd1
-
Filesize
34KB
MD5259fc24e5c64c722ffd58f0d9672a6bc
SHA1d12e428dd73aa7ea3a2e44b706033d0714cd9bfa
SHA256f15ee940b81092ac8e1815b6abdd6285138995b76f1aa1980a1e24ad707fd8a7
SHA512222a5130d1bee3bd3b588c1d3f90fc1be5898bd4a60fd4a5ddc485ca32d2eb544382b71cd026d62f12c3ceb1bf162d6e11325a224265fbbc9892fd93f33f095b