Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 15:25
Static task
static1
Behavioral task
behavioral1
Sample
357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe
-
Size
164KB
-
MD5
357f765c8a9933ba3d7a4648ecd5d0f3
-
SHA1
b6c236cf63f9eb754af4174bdf15b06323899fbd
-
SHA256
77b8a767e24da266946c335b5cfdcd599a14a7b13b78e335e29aedcd04c170a9
-
SHA512
fab7ff68711f58c2247c4a670c6ac41af27f4b52fa1b5918c01ef9eecb4a1e751deabbc29d993053d92ef4f23d8794144deeba0583a53f88c0e86eb2e5c6ac96
-
SSDEEP
3072:oqkCzLqWf6CYXHnWNKmp9pj6l7fyp3ZOWHh1z/a:olCzL72Xn/mljtkUhpi
Malware Config
Extracted
tofsee
94.75.255.140
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2104 nrb.exe 2292 nrb.exe -
Loads dropped DLL 3 IoCs
pid Process 2020 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 2020 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 2104 nrb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\nrb.exe\" /r" 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2156 set thread context of 2020 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 30 PID 2104 set thread context of 2292 2104 nrb.exe 34 PID 2292 set thread context of 2752 2292 nrb.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2020 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2020 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2020 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2020 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2020 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2020 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2020 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2020 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2020 2156 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 30 PID 2020 wrote to memory of 2104 2020 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 31 PID 2020 wrote to memory of 2104 2020 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 31 PID 2020 wrote to memory of 2104 2020 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 31 PID 2020 wrote to memory of 2104 2020 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 31 PID 2020 wrote to memory of 2912 2020 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 32 PID 2020 wrote to memory of 2912 2020 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 32 PID 2020 wrote to memory of 2912 2020 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 32 PID 2020 wrote to memory of 2912 2020 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 32 PID 2104 wrote to memory of 2292 2104 nrb.exe 34 PID 2104 wrote to memory of 2292 2104 nrb.exe 34 PID 2104 wrote to memory of 2292 2104 nrb.exe 34 PID 2104 wrote to memory of 2292 2104 nrb.exe 34 PID 2104 wrote to memory of 2292 2104 nrb.exe 34 PID 2104 wrote to memory of 2292 2104 nrb.exe 34 PID 2104 wrote to memory of 2292 2104 nrb.exe 34 PID 2104 wrote to memory of 2292 2104 nrb.exe 34 PID 2104 wrote to memory of 2292 2104 nrb.exe 34 PID 2292 wrote to memory of 2752 2292 nrb.exe 35 PID 2292 wrote to memory of 2752 2292 nrb.exe 35 PID 2292 wrote to memory of 2752 2292 nrb.exe 35 PID 2292 wrote to memory of 2752 2292 nrb.exe 35 PID 2292 wrote to memory of 2752 2292 nrb.exe 35 PID 2292 wrote to memory of 2752 2292 nrb.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\nrb.exe"C:\Users\Admin\nrb.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\nrb.exe"C:\Users\Admin\nrb.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1631.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5d02e3ae2a394e5ce37bf1f37f4956534
SHA19580772968f9e5063c001262f3296a1f12a0e405
SHA2565e5679fdd2ae4a4879d2dd2649e26cab703ac807bf6f27cd25989c1c9d9dbaa3
SHA512a328956bf1979b67ff9818b8b618f2a9ebbce71d2e7718e2fbb75687b5931d270300b97adf5ab82555d2da699170300925972b0f32e6f8ec9f4974d83983f6e1
-
Filesize
164KB
MD5357f765c8a9933ba3d7a4648ecd5d0f3
SHA1b6c236cf63f9eb754af4174bdf15b06323899fbd
SHA25677b8a767e24da266946c335b5cfdcd599a14a7b13b78e335e29aedcd04c170a9
SHA512fab7ff68711f58c2247c4a670c6ac41af27f4b52fa1b5918c01ef9eecb4a1e751deabbc29d993053d92ef4f23d8794144deeba0583a53f88c0e86eb2e5c6ac96