Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
2a859392c6469ad351fd3e19d22e40cc
-
SHA1
9adfab0b5f862a5dc9e949f261340bf5dac1f513
-
SHA256
677019b82898d51a1b09628b343dde353f0d6769c5becb03f6ef5cddbd4c0dd2
-
SHA512
4e94a0d986f0b2802308b3593de91e42844e4fbfb7a2e4ba878df87121fa038be235ede80ec1c37d6ee7ad65c9937bb21dbb1400e230753446ea622e0ccc4735
-
SSDEEP
24576:TPpOwQoyEvOKdpEcVImZgxUJQB0CQKP+Odrg4XJ5H:jcl36pEcVxo0CPDdEUf
Malware Config
Signatures
-
Executes dropped EXE 20 IoCs
pid Process 2704 system34.exe 2884 system34.exe 2784 system34.exe 2652 system34.exe 1340 system34.exe 2856 system34.exe 2680 system34.exe 2848 system34.exe 2840 system34.exe 2128 system34.exe 2196 system34.exe 1620 system34.exe 1516 system34.exe 2452 system34.exe 1780 system34.exe 2316 system34.exe 3068 system34.exe 2988 system34.exe 3004 system34.exe 2648 system34.exe -
Loads dropped DLL 21 IoCs
pid Process 3052 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 3052 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 2704 system34.exe 2884 system34.exe 2884 system34.exe 2652 system34.exe 2652 system34.exe 2856 system34.exe 2856 system34.exe 2848 system34.exe 2848 system34.exe 2128 system34.exe 2128 system34.exe 1620 system34.exe 1620 system34.exe 2452 system34.exe 2452 system34.exe 2316 system34.exe 2316 system34.exe 2988 system34.exe 2988 system34.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\system34.exe system34.exe File created C:\Windows\SysWOW64\system34.exe system34.exe File created C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File created C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File created C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File created C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File created C:\Windows\SysWOW64\system34.exe 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File created C:\Windows\SysWOW64\system34.exe system34.exe File created C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File created C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File created C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe File opened for modification C:\Windows\SysWOW64\system34.exe system34.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1340 system34.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2072 set thread context of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2704 set thread context of 2884 2704 system34.exe 32 PID 2784 set thread context of 2652 2784 system34.exe 35 PID 1340 set thread context of 2856 1340 system34.exe 37 PID 2680 set thread context of 2848 2680 system34.exe 39 PID 2840 set thread context of 2128 2840 system34.exe 41 PID 2196 set thread context of 1620 2196 system34.exe 43 PID 1516 set thread context of 2452 1516 system34.exe 45 PID 1780 set thread context of 2316 1780 system34.exe 47 PID 3068 set thread context of 2988 3068 system34.exe 49 PID 3004 set thread context of 2648 3004 system34.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system34.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 2704 system34.exe 2704 system34.exe 2784 system34.exe 2784 system34.exe 1340 system34.exe 1340 system34.exe 2680 system34.exe 2680 system34.exe 2840 system34.exe 2840 system34.exe 2196 system34.exe 2196 system34.exe 1516 system34.exe 1516 system34.exe 1780 system34.exe 1780 system34.exe 3068 system34.exe 3068 system34.exe 3004 system34.exe 3004 system34.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 2072 wrote to memory of 3052 2072 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2704 3052 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2704 3052 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2704 3052 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2704 3052 2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2704 wrote to memory of 2884 2704 system34.exe 32 PID 2884 wrote to memory of 2784 2884 system34.exe 34 PID 2884 wrote to memory of 2784 2884 system34.exe 34 PID 2884 wrote to memory of 2784 2884 system34.exe 34 PID 2884 wrote to memory of 2784 2884 system34.exe 34 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2784 wrote to memory of 2652 2784 system34.exe 35 PID 2652 wrote to memory of 1340 2652 system34.exe 36 PID 2652 wrote to memory of 1340 2652 system34.exe 36 PID 2652 wrote to memory of 1340 2652 system34.exe 36 PID 2652 wrote to memory of 1340 2652 system34.exe 36 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 1340 wrote to memory of 2856 1340 system34.exe 37 PID 2856 wrote to memory of 2680 2856 system34.exe 38 PID 2856 wrote to memory of 2680 2856 system34.exe 38 PID 2856 wrote to memory of 2680 2856 system34.exe 38 PID 2856 wrote to memory of 2680 2856 system34.exe 38 PID 2680 wrote to memory of 2848 2680 system34.exe 39 PID 2680 wrote to memory of 2848 2680 system34.exe 39 PID 2680 wrote to memory of 2848 2680 system34.exe 39 PID 2680 wrote to memory of 2848 2680 system34.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\system34.exeC:\Windows\system32\system34.exe 528 "C:\Users\Admin\AppData\Local\Temp\2a859392c6469ad351fd3e19d22e40cc_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\system34.exeC:\Windows\SysWOW64\system34.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\system34.exeC:\Windows\system32\system34.exe 524 "C:\Windows\SysWOW64\system34.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\system34.exeC:\Windows\SysWOW64\system34.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\system34.exeC:\Windows\system32\system34.exe 524 "C:\Windows\SysWOW64\system34.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\system34.exeC:\Windows\SysWOW64\system34.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\system34.exeC:\Windows\system32\system34.exe 524 "C:\Windows\SysWOW64\system34.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\system34.exeC:\Windows\SysWOW64\system34.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\system34.exeC:\Windows\system32\system34.exe 524 "C:\Windows\SysWOW64\system34.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Windows\SysWOW64\system34.exeC:\Windows\SysWOW64\system34.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\SysWOW64\system34.exeC:\Windows\system32\system34.exe 524 "C:\Windows\SysWOW64\system34.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Windows\SysWOW64\system34.exeC:\Windows\SysWOW64\system34.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\system34.exeC:\Windows\system32\system34.exe 524 "C:\Windows\SysWOW64\system34.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1516 -
C:\Windows\SysWOW64\system34.exeC:\Windows\SysWOW64\system34.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Windows\SysWOW64\system34.exeC:\Windows\system32\system34.exe 524 "C:\Windows\SysWOW64\system34.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Windows\SysWOW64\system34.exeC:\Windows\SysWOW64\system34.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\system34.exeC:\Windows\system32\system34.exe 524 "C:\Windows\SysWOW64\system34.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Windows\SysWOW64\system34.exeC:\Windows\SysWOW64\system34.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\system34.exeC:\Windows\system32\system34.exe 524 "C:\Windows\SysWOW64\system34.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Windows\SysWOW64\system34.exeC:\Windows\SysWOW64\system34.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52a859392c6469ad351fd3e19d22e40cc
SHA19adfab0b5f862a5dc9e949f261340bf5dac1f513
SHA256677019b82898d51a1b09628b343dde353f0d6769c5becb03f6ef5cddbd4c0dd2
SHA5124e94a0d986f0b2802308b3593de91e42844e4fbfb7a2e4ba878df87121fa038be235ede80ec1c37d6ee7ad65c9937bb21dbb1400e230753446ea622e0ccc4735
-
Filesize
14B
MD5bbec675ebbfafcbe720fc6b71d4df0c8
SHA1334494f8aea84029516cf2c579bb864da4ae4dfa
SHA256432ee047a376cb6856d6981b63e5f68a862c9a501c32eadbffb98f91375e99fe
SHA512006f0dd575a6d09891166205eef98168ec5822b621b5a73795d3917632fbb0be016dcd88848a0e534a932f0fba4a005083240fc3dfc82919e5fbd755538109f7