Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe
-
Size
96KB
-
MD5
2fd5ae85f739bb6a1def1109b6e9e281
-
SHA1
7596ead9d103d86ac3ab8a82f4bf3064d5b8095d
-
SHA256
c7d9979a860b8d99446d80722392609e3939ae1985746d5c9cc8acdd3e0c956c
-
SHA512
241a922695ec386c4e6901955de4a2a3ec2a55b19612daa535e61dc2e3ff92f5fef86344e976b79082923c057ddeb4e55ad8983fe9a9b5d0a7504e7afd170537
-
SSDEEP
1536:P8kcu4l7dSZ9T+2mxPAsL/JbuOLZ64ZCPBKbnziw1dVOcwCCQc+VDM+QJtOw/:Dcj7k/y2mxB9uMzZCPBK1Dw9Raw/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1736 taskhost.exe 2204 taskhost.exe -
Loads dropped DLL 3 IoCs
pid Process 2452 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 2452 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 1736 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3024 set thread context of 2452 3024 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 31 PID 1736 set thread context of 2204 1736 taskhost.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2452 3024 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2452 3024 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2452 3024 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2452 3024 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2452 3024 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2452 3024 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 31 PID 2452 wrote to memory of 1736 2452 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 32 PID 2452 wrote to memory of 1736 2452 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 32 PID 2452 wrote to memory of 1736 2452 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 32 PID 2452 wrote to memory of 1736 2452 2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe 32 PID 1736 wrote to memory of 2204 1736 taskhost.exe 33 PID 1736 wrote to memory of 2204 1736 taskhost.exe 33 PID 1736 wrote to memory of 2204 1736 taskhost.exe 33 PID 1736 wrote to memory of 2204 1736 taskhost.exe 33 PID 1736 wrote to memory of 2204 1736 taskhost.exe 33 PID 1736 wrote to memory of 2204 1736 taskhost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2fd5ae85f739bb6a1def1109b6e9e281_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:2204
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59fc0eb93cb46cb3f792b9b762166421a
SHA1fe385cbedf1efe8b1928a6d3a8f2ffa99408bc0b
SHA25640eefe8c483428302e82224d98af192c4176b4826d527f53ae70e0df5767a0fe
SHA512d7c8dbe71829fab0edcfe42a9487437a028e0569b07beacc6a42d90ba7f085e12970c5b57332f2492b79ab5217ad129b7e1373c469004a8e2acc8c6508fd73e2