Analysis
-
max time kernel
140s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
291625230f4a93f33141367d96d57ff9
-
SHA1
d2df36791639c4bcfe85c3281f09c59c6f96c477
-
SHA256
a1eccbfa54b587ae09d151e941de636178c7ac0f31b90d545d79db78bccddfb1
-
SHA512
04f39a561eadacca80981951c2a5d1b453266e188d4b42463c9242a0760167b6de186123bcdfc86f4544dcb5d9da7ae1966cb438c51fc30be73f135eef7e5892
-
SSDEEP
24576:SFsltdyQkcUeVOTMjPXuJtT3hlMrVFU9tPOGPO8POYPOt7rVFU903hHtcjQpqAWy:SIJjmJtT3hOrVFUHP/PLPTPgrVFUC3hh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5068 gamemulti 1834 [ xp ].exe 4004 isass.exe -
Loads dropped DLL 4 IoCs
pid Process 4004 isass.exe 4004 isass.exe 5068 gamemulti 1834 [ xp ].exe 5068 gamemulti 1834 [ xp ].exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Admin\\AppData\\Local\\isass.exe \"" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gamemulti 1834 [ xp ].exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2160 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe 4004 isass.exe 4004 isass.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4004 isass.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4004 isass.exe 5068 gamemulti 1834 [ xp ].exe 5068 gamemulti 1834 [ xp ].exe 5068 gamemulti 1834 [ xp ].exe 5068 gamemulti 1834 [ xp ].exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1148 wrote to memory of 5068 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe 85 PID 1148 wrote to memory of 5068 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe 85 PID 1148 wrote to memory of 5068 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe 85 PID 1148 wrote to memory of 4004 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe 86 PID 1148 wrote to memory of 4004 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe 86 PID 1148 wrote to memory of 4004 1148 291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe 86 PID 4004 wrote to memory of 4888 4004 isass.exe 87 PID 4004 wrote to memory of 4888 4004 isass.exe 87 PID 4004 wrote to memory of 4888 4004 isass.exe 87 PID 4888 wrote to memory of 3784 4888 cmd.exe 89 PID 4888 wrote to memory of 3784 4888 cmd.exe 89 PID 4888 wrote to memory of 3784 4888 cmd.exe 89 PID 3784 wrote to memory of 2160 3784 cmd.exe 90 PID 3784 wrote to memory of 2160 3784 cmd.exe 90 PID 3784 wrote to memory of 2160 3784 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\291625230f4a93f33141367d96d57ff9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\gamemulti 1834 [ xp ].exe"C:\Users\Admin\AppData\Local\gamemulti 1834 [ xp ].exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5068
-
-
C:\Users\Admin\AppData\Local\isass.exeC:\Users\Admin\AppData\Local\isass.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c setup.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Local\isass.exe \"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Local\isass.exe \"" /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2160
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD5330d9a81f808b287b999c76c1d932ed6
SHA195146f6f084c39395e2fae892af065e85fddb8d1
SHA2564e2ba5afae8aedfb7664f479ff30667dbabee99f63c922206df98ff56456a03f
SHA5124abd3d3c6b40ae046366604fdfabdc2c97a54cd4c4046452014fb1087353d216b2920650cc2d147fd6c1a79fd7d73d7cd46a8ada0a5c70de70b87b480034e812
-
Filesize
604KB
MD5e06726a3756492148131c7bd40f64ee6
SHA1bbebea6a16dfd8d9bb36af9c79438a1818c4131a
SHA256ca2f7564a187593957befb9bfd2fc1228a40790cfc012548086b2018e1c18358
SHA51209c6686ab85e35e07904bbbaaa980182b4d49760dbb7b553788a70ec3e0e47d31a20acf6a2ef4df7571c86324e6f0085cd12fdf9fdb8c06e2ed32d3eff345e08
-
Filesize
114KB
MD5025eaa3cee6e9f4d146b03fe2a19ef18
SHA1fde309fdc5a3a593a68666a665ffd373852443db
SHA2561910c2c17510fef431ffa6d739d6810a7c15a6e3f5647295a01b90eb10071936
SHA512f5784c4175094c03a922384ad8d6ef56090170f5b1fb1cf53f6e066000898073cf4db9465ee6d22e3314f67814dc27aa2bdf42daa03bb6fbcee9c1574c3fa119
-
Filesize
238KB
MD57b4c2a53c459c513b9577666592ea527
SHA1bee4c401988641187512311c6d57f5a35964473a
SHA256a53586432386bd588e9fdc74dbfc3b1905c35b4cf09e2359096bef697c57f534
SHA51217860b50a28294dc1605ef7c26cd2f652447caa6adc1b78de54f2e05fcff3457c8ca0a557342c3089a3fc661f632cc483272c1b3340860ee6ca22978c8d7c2ac