Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 05:53
Behavioral task
behavioral1
Sample
3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe
-
Size
28KB
-
MD5
3e2a921ef960c41f53fd258e8acfbdc7
-
SHA1
65fe05319f75496dcc700a4fd6f2873cb3b9fc7b
-
SHA256
e00d1ec771160c0f401397f8287126591033d2cb52022db3daee1f97aba33063
-
SHA512
f25cb061de19f15a755f9d6ca5e8d8b17c85db67d7f96350344d6554fce782289bf3b84fdaaece3d0c6116ea5f5354827d7035a7972873f830e6e269b11f4ea8
-
SSDEEP
768:Gu1olhnh/hz2Fs4Iwpn+RgCE37m0dtZ4d01HryV7R:D1GZF9scCnnN3jv1Lg7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\.nvsvc = "C:\\Windows\\system\\smss.exe /w" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\.nvsvc = "C:\\Windows\\system\\smss.exe /w" 3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1644 set thread context of 3028 1644 3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe 30 -
resource yara_rule behavioral1/memory/1644-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/3028-3-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/3028-5-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-6-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-11-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-12-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-13-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-14-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-15-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-16-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-17-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-18-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-19-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-20-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-21-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1644-22-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\system\smss.exe svchost.exe File opened for modification C:\Windows\system\smss.exe svchost.exe File opened for modification C:\Windows\system\smss.exe 3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1644 wrote to memory of 3028 1644 3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe 30 PID 1644 wrote to memory of 3028 1644 3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe 30 PID 1644 wrote to memory of 3028 1644 3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe 30 PID 1644 wrote to memory of 3028 1644 3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe 30 PID 1644 wrote to memory of 3028 1644 3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e2a921ef960c41f53fd258e8acfbdc7_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3028
-