Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe
-
Size
454KB
-
MD5
32d712e49d20b4a084ce8a0ece18b495
-
SHA1
1edd625d0cf072a38d0b21a4a73c8e00e2d1c2bb
-
SHA256
61d7be6bb79af781ef912f5750f88a76ebf6ab0debd57213860b76508fbc8226
-
SHA512
77820b59b0b2361e823ce74735ac442f9ea3af60347e1a8436c8365054a199954e4293eebcfcf2b16622576b673d6d48bce0bec85804f0c6b945e530c0bb486d
-
SSDEEP
6144:gxiiALtsCxdenfDpdXCeoA+MXIryHUZBOl3TqyKrB9gHQlOPpzt0nPF:AALtnbQdXC9Lry0YFE9v
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 iplogger.org 5 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2796 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2796 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 944 wrote to memory of 2640 944 32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe 32 PID 944 wrote to memory of 2640 944 32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe 32 PID 944 wrote to memory of 2640 944 32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe 32 PID 944 wrote to memory of 2640 944 32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe 32 PID 2640 wrote to memory of 2796 2640 cmd.exe 34 PID 2640 wrote to memory of 2796 2640 cmd.exe 34 PID 2640 wrote to memory of 2796 2640 cmd.exe 34 PID 2640 wrote to memory of 2796 2640 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "32d712e49d20b4a084ce8a0ece18b495_JaffaCakes118.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-