Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe
-
Size
72KB
-
MD5
3f6483e63b1f4b1885c284ff30fadc85
-
SHA1
f4a4ac92045737d561d72db9a9f5ac51290cfbce
-
SHA256
1fee0b82926074d62adbf43321933b28227dd82d278fd536dff6a78b354569f7
-
SHA512
43bfafd0d1adfaeda4e13f3d40a5acc5b85db14ebc0b916129ff771174da70a71cfd3bb6d0a1c4fb9d03a7c285b6c90ece9bfcff8dedb148b7ae53d206f4087f
-
SSDEEP
768:96s1iSWKkOCfJb4kHrgrTi6yBJJyNKJCviXDyiwSuo6zCNKVgq:wUGirEJycA8Dy9Suo6zC/
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2736 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2736 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2992 3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2304 2992 3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe 30 PID 2992 wrote to memory of 2304 2992 3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe 30 PID 2992 wrote to memory of 2304 2992 3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe 30 PID 2992 wrote to memory of 2304 2992 3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe 30 PID 2304 wrote to memory of 2736 2304 cmd.exe 32 PID 2304 wrote to memory of 2736 2304 cmd.exe 32 PID 2304 wrote to memory of 2736 2304 cmd.exe 32 PID 2304 wrote to memory of 2736 2304 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f6483e63b1f4b1885c284ff30fadc85_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 3f6483e63b1f4b1885c284ff30fadc85_J2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-