Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 21:21
Behavioral task
behavioral1
Sample
259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe
-
Size
34KB
-
MD5
259fc24e5c64c722ffd58f0d9672a6bc
-
SHA1
d12e428dd73aa7ea3a2e44b706033d0714cd9bfa
-
SHA256
f15ee940b81092ac8e1815b6abdd6285138995b76f1aa1980a1e24ad707fd8a7
-
SHA512
222a5130d1bee3bd3b588c1d3f90fc1be5898bd4a60fd4a5ddc485ca32d2eb544382b71cd026d62f12c3ceb1bf162d6e11325a224265fbbc9892fd93f33f095b
-
SSDEEP
768:gwgpGhJLzu4QhHHZxojWnC8GPKLGbuiSfxz6nbcuyD7U:Pgpm3u4QHnoyC4LvNfYnouy8
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\iqdgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2jwy03e.exe" 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 2jwy03e.exe -
Executes dropped EXE 2 IoCs
pid Process 1444 2jwy03e.exe 1332 2jwy03e.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\gr8hvqw.log 2jwy03e.exe -
resource yara_rule behavioral2/memory/4040-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/files/0x0017000000023c49-5.dat upx behavioral2/memory/4040-12-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/1444-17-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/1332-19-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/1332-24-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/1444-27-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1680 sc.exe 3036 sc.exe 3836 sc.exe 4236 sc.exe 5048 sc.exe 1224 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2jwy03e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2jwy03e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 1444 2jwy03e.exe 1444 2jwy03e.exe 1444 2jwy03e.exe 1332 2jwy03e.exe 1332 2jwy03e.exe 1332 2jwy03e.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4040 wrote to memory of 1800 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 87 PID 4040 wrote to memory of 1800 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 87 PID 4040 wrote to memory of 1800 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 87 PID 4040 wrote to memory of 3036 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 88 PID 4040 wrote to memory of 3036 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 88 PID 4040 wrote to memory of 3036 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 88 PID 4040 wrote to memory of 1328 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 90 PID 4040 wrote to memory of 1328 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 90 PID 4040 wrote to memory of 1328 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 90 PID 4040 wrote to memory of 1680 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 91 PID 4040 wrote to memory of 1680 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 91 PID 4040 wrote to memory of 1680 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 91 PID 4040 wrote to memory of 1444 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 94 PID 4040 wrote to memory of 1444 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 94 PID 4040 wrote to memory of 1444 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 94 PID 1800 wrote to memory of 1608 1800 net.exe 96 PID 1800 wrote to memory of 1608 1800 net.exe 96 PID 1800 wrote to memory of 1608 1800 net.exe 96 PID 4040 wrote to memory of 440 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 97 PID 4040 wrote to memory of 440 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 97 PID 4040 wrote to memory of 440 4040 259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe 97 PID 1328 wrote to memory of 2904 1328 net.exe 98 PID 1328 wrote to memory of 2904 1328 net.exe 98 PID 1328 wrote to memory of 2904 1328 net.exe 98 PID 1444 wrote to memory of 4996 1444 2jwy03e.exe 100 PID 1444 wrote to memory of 4996 1444 2jwy03e.exe 100 PID 1444 wrote to memory of 4996 1444 2jwy03e.exe 100 PID 1444 wrote to memory of 3836 1444 2jwy03e.exe 101 PID 1444 wrote to memory of 3836 1444 2jwy03e.exe 101 PID 1444 wrote to memory of 3836 1444 2jwy03e.exe 101 PID 1444 wrote to memory of 116 1444 2jwy03e.exe 102 PID 1444 wrote to memory of 116 1444 2jwy03e.exe 102 PID 1444 wrote to memory of 116 1444 2jwy03e.exe 102 PID 1444 wrote to memory of 4236 1444 2jwy03e.exe 103 PID 1444 wrote to memory of 4236 1444 2jwy03e.exe 103 PID 1444 wrote to memory of 4236 1444 2jwy03e.exe 103 PID 1444 wrote to memory of 1332 1444 2jwy03e.exe 104 PID 1444 wrote to memory of 1332 1444 2jwy03e.exe 104 PID 1444 wrote to memory of 1332 1444 2jwy03e.exe 104 PID 116 wrote to memory of 3764 116 net.exe 109 PID 116 wrote to memory of 3764 116 net.exe 109 PID 116 wrote to memory of 3764 116 net.exe 109 PID 4996 wrote to memory of 3904 4996 net.exe 110 PID 4996 wrote to memory of 3904 4996 net.exe 110 PID 4996 wrote to memory of 3904 4996 net.exe 110 PID 1332 wrote to memory of 4192 1332 2jwy03e.exe 111 PID 1332 wrote to memory of 4192 1332 2jwy03e.exe 111 PID 1332 wrote to memory of 4192 1332 2jwy03e.exe 111 PID 1332 wrote to memory of 5048 1332 2jwy03e.exe 112 PID 1332 wrote to memory of 5048 1332 2jwy03e.exe 112 PID 1332 wrote to memory of 5048 1332 2jwy03e.exe 112 PID 1332 wrote to memory of 648 1332 2jwy03e.exe 113 PID 1332 wrote to memory of 648 1332 2jwy03e.exe 113 PID 1332 wrote to memory of 648 1332 2jwy03e.exe 113 PID 1332 wrote to memory of 1224 1332 2jwy03e.exe 114 PID 1332 wrote to memory of 1224 1332 2jwy03e.exe 114 PID 1332 wrote to memory of 1224 1332 2jwy03e.exe 114 PID 4192 wrote to memory of 4300 4192 net.exe 119 PID 4192 wrote to memory of 4300 4192 net.exe 119 PID 4192 wrote to memory of 4300 4192 net.exe 119 PID 648 wrote to memory of 2624 648 net.exe 120 PID 648 wrote to memory of 2624 648 net.exe 120 PID 648 wrote to memory of 2624 648 net.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\259fc24e5c64c722ffd58f0d9672a6bc_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\2jwy03e.exeC:\Users\Admin\AppData\Local\Temp\2jwy03e.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:3904
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3836
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- System Location Discovery: System Language Discovery
PID:3764
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\2jwy03e.exeC:\Users\Admin\AppData\Local\Temp\2jwy03e.exe -d5E4D45AF11D6AD72D928DCFBD490ED17A36A80B0A4F939F2790B7502C51FD78EE468BBA236B781E15D6E0E92B5FDC1E226E9B30EC9BD0D134023A81BEA54AB036821EE415C5456BAE0A185C2DB20959FA99E2965AA1BE2E2C4761E660FFB7F07EB8B64763D1D2A9A63A7B7E400D469302DE05B7CD09DB68C47685010F08154ED6E64963D6253FE3A2A692D4E25F33E41B05FD1C5F5088ADACA5AC6B716CC28F235690C8D87E8D2C9AEF25F0606A512B3771104B51A3B5E994D4FF9693B7BB85CB9D53F2C6920A75A315E921F2CBCA2F6FA4A7A2FFBB7334C15C76F111CAD8C6B3CF871798E347BCEB45B089A519476347E4BACB1215207B09824A12B41B76137BF5BE75DB3304FE937C73A13326B4B89019F2217466497001B58174267CF3518421819E094A92317BB8CB0CE57591FF2844A559327586B4E9EAE4A3D483609770A4790E3BA62F844827CE3BE7DB1F3174BB787C44CD8404822847C166D89DDA18DEDC2E2DFC5CC5105B659C05E90C792CF59FD01722B142FA5EFF2AD9222B254105538DE045DA07088ED8B06837A9C2552542F205369E8946CF724B4746A868093EC6AFEE578743F0C84BD39A86070CDD54FA6417837BC5CEFC19B2399E85A4B17639DA60B8049518FE634FC8A32443B3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:4300
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5048
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"5⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1224
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\5xb5y8f33.bat2⤵
- System Location Discovery: System Language Discovery
PID:440
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5259fc24e5c64c722ffd58f0d9672a6bc
SHA1d12e428dd73aa7ea3a2e44b706033d0714cd9bfa
SHA256f15ee940b81092ac8e1815b6abdd6285138995b76f1aa1980a1e24ad707fd8a7
SHA512222a5130d1bee3bd3b588c1d3f90fc1be5898bd4a60fd4a5ddc485ca32d2eb544382b71cd026d62f12c3ceb1bf162d6e11325a224265fbbc9892fd93f33f095b
-
Filesize
218B
MD5d336ed97b14afcf34006cb9a58a09576
SHA177af35ac97f63d42aefb1f336eacf8dadc25b47f
SHA256c5fae6de73e5f2c73df13ea2163ff45bc5cee0e516fc62216adbe5aa37c9ca52
SHA512647a8279d28c1b22217e641a127983a3bf527d96c33426d45e897fa0da94393fedea67e311595b67f967dbf8bc6b9ba1400f03ac11257cd3ce4073c24588cbd1