Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe
-
Size
376KB
-
MD5
3c6440d12ae8909ac8b4e67a9d2c27aa
-
SHA1
cb056af1377d28875f4208523abb365ecac46ca3
-
SHA256
9ca97cf7fd1aa8e3708c9d4ac6ddd26c02f8a0d11d9b6b297966363917931370
-
SHA512
24fe6dc464cedb9d8bfffd706148e1b5e44447a1f2d4e13abebd1f96c660bdde5e2f87231231c3d09b2128d373d403f717a858bb5dcadee0e3243bfe0be9e827
-
SSDEEP
6144:KSnPobDUShUmcREtiUcvpKey4Kkb0c/Fnk06hiqP2NXoiyJmEW5c1xZu9MYRqH:pngbDnsREtirRK3LZSey+2NYxM5Cx8S7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2468 lCf21500bDdFm21500.exe -
Executes dropped EXE 2 IoCs
pid Process 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe -
Loads dropped DLL 4 IoCs
pid Process 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\lCf21500bDdFm21500 = "C:\\ProgramData\\lCf21500bDdFm21500\\lCf21500bDdFm21500.exe" lCf21500bDdFm21500.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lCf21500bDdFm21500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lCf21500bDdFm21500.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main lCf21500bDdFm21500.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2388 lCf21500bDdFm21500.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2388 lCf21500bDdFm21500.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2388 lCf21500bDdFm21500.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2388 lCf21500bDdFm21500.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2388 lCf21500bDdFm21500.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2388 lCf21500bDdFm21500.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2388 lCf21500bDdFm21500.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2388 lCf21500bDdFm21500.exe 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe 2388 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe Token: SeDebugPrivilege 2388 lCf21500bDdFm21500.exe Token: SeDebugPrivilege 2468 lCf21500bDdFm21500.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2468 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2468 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2468 lCf21500bDdFm21500.exe 2468 lCf21500bDdFm21500.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2388 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2388 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2388 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2388 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2468 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2468 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2468 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2468 2336 3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\ProgramData\lCf21500bDdFm21500\lCf21500bDdFm21500.exe"C:\ProgramData\lCf21500bDdFm21500\lCf21500bDdFm21500.exe" BOMBARDAMAXIMUM2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\ProgramData\lCf21500bDdFm21500\lCf21500bDdFm21500.exe"C:\ProgramData\lCf21500bDdFm21500\lCf21500bDdFm21500.exe" "C:\Users\Admin\AppData\Local\Temp\3c6440d12ae8909ac8b4e67a9d2c27aa_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD599d1d4630b03250889122a88e816cc65
SHA10426457d61212605edea2175eed55063f28c7181
SHA2563418e237e7d37ed098c3e54ba6857c18de7ae2193cd52ebde931d891c316aa0d
SHA5127e7eb59373723d52e09ef33fa74244c7e59c4643643a2c0b27c9b4a7bc065c56dfa2a4669a5cc3d6cca3c7caa64b61e438dcbe089c2ba577ad6e58cefd8605f4
-
Filesize
192B
MD5aa53db0e4f16e93d1bfe6965f5edbb23
SHA1b04c6c671e25c77995ac5ce13c31a92a59376675
SHA2564c9fc920063a4aea7e5df17ac7fe65ad0d70ae51b8fd16015beedee42e47395f
SHA5126320fcb85c9977186d569a0868d183d5fbb001fc2e40c315dc6a0d71a7f1270d726d0e946e7f06fd87197c6e01133179b86a70c55512430a4cada4804d55d2e6
-
Filesize
376KB
MD5debfc08bb739e2340a677a925ffffd93
SHA1c45bd5980df0c164c75370440b47fe33a4467dc6
SHA256c15b193bc8a7db36ece0020c410ef010cd438e9d8a08ffef1af0242aedae91c9
SHA5128fcb1b102066c9113d3376cdee38eb02e7c5dec65881863309e17bc35666a98ac5d25969490d198b2deff259897e7e7b5afee80696c94301e7f81fa6d664e461