Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe
-
Size
132KB
-
MD5
27fcf2b5cea97e7f0b46efc56c4e51d3
-
SHA1
3ed676010997f7b0784c3969a5e625ab8460fecc
-
SHA256
e60164d938a58fb1cb736cd395dfa9c7db0126d4f3c326c48fe47372c9151f41
-
SHA512
ba81363c7db6a5e84745702c7cb11d2273aab352110e6a09c12ffa102b27f0f80e2170881cdc869e7c7d7d132999e540c98332317205e1edbdeed755849f6660
-
SSDEEP
1536:5TvlubSHe/jHLsh6LctKWH0gEtWTE/rli5Z1nWvjI4TWRtss+cfWAY+/Vb2XmzfH:5cbFvLctKWAW8AB8baRts4WNg2Xmav
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2564 taskhost.exe 2624 taskhost.exe -
Loads dropped DLL 3 IoCs
pid Process 2608 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 2608 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 2564 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\taskhost.exe" taskhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2184 set thread context of 2608 2184 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 28 PID 2564 set thread context of 2624 2564 taskhost.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2608 2184 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2608 2184 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2608 2184 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2608 2184 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2608 2184 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2608 2184 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 28 PID 2608 wrote to memory of 2564 2608 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 29 PID 2608 wrote to memory of 2564 2608 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 29 PID 2608 wrote to memory of 2564 2608 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 29 PID 2608 wrote to memory of 2564 2608 27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2624 2564 taskhost.exe 30 PID 2564 wrote to memory of 2624 2564 taskhost.exe 30 PID 2564 wrote to memory of 2624 2564 taskhost.exe 30 PID 2564 wrote to memory of 2624 2564 taskhost.exe 30 PID 2564 wrote to memory of 2624 2564 taskhost.exe 30 PID 2564 wrote to memory of 2624 2564 taskhost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\27fcf2b5cea97e7f0b46efc56c4e51d3_JaffaCakes118.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD52da321ee2d987b5219b158a60d299398
SHA1cde2d2937299dc5c177b183bd5c531695f90c215
SHA256e7d9b93225ad64f3381a8c9a8e55e163a4e5bcf2221335ddfccdc6eb7cea8a46
SHA512c478bec8a77dc012c404056150f727f34d9d88d3734cad914419eb9895d9ba0443dee38f844cc98108a9bb167a01569c3d7dd9f9d13976c05d633979b43098b3