Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe
-
Size
640KB
-
MD5
3c4163008f0b7465fa28f06262df4f76
-
SHA1
d8f71ae43bd923c85ac8fe57e8d529bc888b3b16
-
SHA256
fc2159ba3961c7366dee99f7b7f828d4ffb74b3aa3367c895acc7bc6ddb47f9d
-
SHA512
c632d110d9a23ae77dd65260eb67c9994595ea2f88cdf7df0d233ca4bc0cd96e6d87cd05a5ef39ef858b4568e0fe340eeba8a0b720d4577a100615526ff900b6
-
SSDEEP
12288:5kkOyMJfsGVmv3Ug5hyoWojk839BU8XQkPGRTCKE+5BQDCMEBGHpNA2exauqGIt/:zOyMJfsg63Zhy4z9RQBC9+zWE0pNEc9R
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2364-1-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-4-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-5-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-88-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-89-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-91-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-90-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-92-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2968-126-0x0000000001C70000-0x0000000001DB2000-memory.dmp upx behavioral1/memory/2968-129-0x0000000001C70000-0x0000000001DB2000-memory.dmp upx behavioral1/memory/2968-130-0x0000000001C70000-0x0000000001DB2000-memory.dmp upx behavioral1/memory/2364-132-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-138-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-147-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-156-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-154-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-159-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-160-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-155-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-161-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-162-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-163-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-164-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-166-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx behavioral1/memory/2364-197-0x0000000001CC0000-0x0000000001E02000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is259434966.log 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2364 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe 2364 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2968 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2364 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2364 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe 2364 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2968 2364 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2968 2364 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2968 2364 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2968 2364 3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe" /_ShowProgress2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
6KB
MD5fe3a2f18579c4086a1c395c0d326ae8e
SHA117e1338550629fbb731891131de8ed141e3978b4
SHA25696a9567d356bafd8fca64a93c8d4abd4a14fc2632900bb1e4bf93500cff20bbb
SHA512fab9dd86125ddff0b097faeee339363874cefff10690460850332d38478dcd3c1188ad57de44755a3643562bfecd6c95518abe95a9dcdb048c3518f2bf3bff74
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
21KB
MD534e0f024634f5e1eeef62b279354595a
SHA19416098e5603ce4482231e01b9fce4339ea3a53c
SHA256491615f8300e559c1ec77208a7abfb0a240f18163e4a7fef4909842a469fff88
SHA5129b0a3b4ac30b6f03f9c42bda32621a1014cb222785677ad1157fe95fd51d1c0972ae24ed888c114c0c580b73bfbd15b23a5e5059903b272092bddcb78c7f46c5
-
Filesize
326B
MD516727ed332d2b2f5e4b0a7421fb1ae84
SHA153409cf8c1ac9bc8a9dc33913ebe2bdcb3dfb508
SHA256f1a2dbb445ce06c5d8f75d315ce4ae900cbbd895f956eeb23f834891413469ce
SHA512e3785d4fa040eaa8eacbc968f05de0db26a0d5564121ac83882625341973a7498da43c7e471dfb894aaaff7242fa263f22c1af2d7c9e2b7e6f39ec3b5b8799db
-
Filesize
286B
MD5cac469bcffdf7b8e7787521171cbcffa
SHA1aee9d687ff8bea0ab5d8c80ba54daafa0c1d8e93
SHA256d22c63f556cab861dbbb993737a6da85241fa80765dcdcc0d70160b1e676a0bd
SHA5124253633f907c680dcd07cf79520fec91d3bf18c21f6c2363899e0649796edb837fcc511ceb542bd8440d2d7324c835dcb93089fa225ce11492499299570d0a97
-
Filesize
2KB
MD574e2fdcc7a0e8161c160c2614a67801c
SHA143a3ccee7e8e9f1448982662e567d1311e21b5fd
SHA2566608965b76e3c0f43eb9ca66c75f5b916ae7348ef7250de5413dad735cde9398
SHA512a7da8a7330a7beab2fd5e04ca3efc917c933cf8e4dadad531a8ac11e8add814890b4693ec9393408230e61e3a934075334953bd1ebadc6938bedf6a11c93f8c3
-
Filesize
2KB
MD574900169442a73b94a452a43bde17248
SHA1b211e593a3bc6559482ddb707399d7b7cf08d331
SHA256c2e7c5e031b4e7bcefa800de4659c8c1ca072ad074d15860583588962beea9b5
SHA512e0a24cf32e8865e9021e161f66f9c275f777ab592e3bb365dd568963aa998612e1dfe9eefdd71e3239ffb43657ef1f86367410192c7769968e9ecfcb6b6ef4c8
-
Filesize
1KB
MD5aa1424f218bf3befbcca3c4c0e42a365
SHA1c91d5dce4ebd543d905026577f8a05dff1d8357e
SHA256e1a823582add59d1406fd36d3f7f86f98873e3201168e542cb49239d6c525ab0
SHA5128ef2ea9613ff50bf028c9ef4611326d61b1cd07d01b89631faa2053449fab9a746e06e59a176dd5cda4f02f77fca8eedbb6e46ae4a78afa416ae8adb7ef0d93b
-
Filesize
1KB
MD561b27f16ef13d3ad95833dd3a932f307
SHA19e0866a07c8309b8f5fb3fbec98531f2ebfbce6f
SHA256be3dee9b5d9f2893607ff916b3c3313987a16092230650dbaeec6e9e36c63ad2
SHA512c3d6a15a826c990bd77c4d2581fe8791fb71346477ee360af50f96a7521e83f5ae89c520af221a737787684eb2b6a714afe9e6d770d9103de4fcc18f767283a0
-
Filesize
6KB
MD594cc832ec3a494140750e5de1feb671b
SHA17be57c13dda3badbba8eede215665ccad5f49ffc
SHA2566926902101ccb6dfe5d0759810b3e0d979971bc5ede6207f9b598c55358e483b
SHA5129f557d04b939ecb7d962e9b48f1525a637f53a0804fefd5e3f25a9bdda05b52412575161618a45675159523a768a0677c0659689bcb1e5a6021c7a6a8f06ab71
-
Filesize
14KB
MD5f3b1d247b28fe64cbc568fbe8102f911
SHA1f3b3dc197cee8500b800e977e7a10b514bfca3e4
SHA2566fe65dfb7c9a1675ada8c39ab352fa50a252a33f8a5e254bf041319fedabecb8
SHA5120a7867a76fa7717e1d1b3d84145783e911275ea313b5c286d89e40372196380ecabaaa0bc1bc20ad5d88fe25d56906842042f508de585f19923647f28812ac98