Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 05:36
Behavioral task
behavioral1
Sample
2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe
-
Size
54KB
-
MD5
2bcf049020e7d81b01b465599e80cfd6
-
SHA1
a83c17585772c7ad5b539a94c3bfb5682e9941c6
-
SHA256
1a2b0be628564d9f18a640b9b05c4a0e45f6e0764be1060a03b40372c83d1fdc
-
SHA512
210bd9bc2a06480fbb7784631c5004d392b0697af88892b3e19a795edf054168596143a4fccf9425d759764d7e391a5400ed8296be431a64e95716115e0643ca
-
SSDEEP
768:SZuMX+I87qsMrtydLraXGjjOXHy5PyHqhaNT7Uce6u:SZP/fJydLr12XUaVOl
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\beep.sys explore.exe File created C:\Windows\SysWOW64\drivers\beep.sys 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4900 explore.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\explore.exe 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\explore.exe 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe File created C:\Windows\SysWOW64\explore.exe explore.exe -
resource yara_rule behavioral2/memory/1956-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0008000000023cbd-5.dat upx behavioral2/memory/1956-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4900-10-0x0000000000400000-0x000000000040F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1956 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4900 explore.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1956 wrote to memory of 4900 1956 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe 83 PID 1956 wrote to memory of 4900 1956 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe 83 PID 1956 wrote to memory of 4900 1956 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe 83 PID 1956 wrote to memory of 4180 1956 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe 84 PID 1956 wrote to memory of 4180 1956 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe 84 PID 1956 wrote to memory of 4180 1956 2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe 84 PID 4900 wrote to memory of 3908 4900 explore.exe 85 PID 4900 wrote to memory of 3908 4900 explore.exe 85 PID 4900 wrote to memory of 3908 4900 explore.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bcf049020e7d81b01b465599e80cfd6_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\explore.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:3908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2BCF04~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57f0ad9a9df6c66f10c981c7cf98a139f
SHA131070056bbeab3cd42b97e3f791d7879249d0131
SHA256b61da29509ad3e3724e18c88296ba54e1f8a89c1aa19c4e31b60ac04e472203f
SHA5120968105c284dbb2d40341e967c517573c46c8882f10e10ffcd815186bfe3146acc58bac836bd09ec51d241a8624be82d66da9d0d869cc45f02312b9f4786281f
-
Filesize
54KB
MD52bcf049020e7d81b01b465599e80cfd6
SHA1a83c17585772c7ad5b539a94c3bfb5682e9941c6
SHA2561a2b0be628564d9f18a640b9b05c4a0e45f6e0764be1060a03b40372c83d1fdc
SHA512210bd9bc2a06480fbb7784631c5004d392b0697af88892b3e19a795edf054168596143a4fccf9425d759764d7e391a5400ed8296be431a64e95716115e0643ca