Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
44ed37df880b56f52a1149354083d167_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44ed37df880b56f52a1149354083d167_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
44ed37df880b56f52a1149354083d167_JaffaCakes118.exe
-
Size
184KB
-
MD5
44ed37df880b56f52a1149354083d167
-
SHA1
c41d9728dbc6aa51f3f88755b7c1e072f80e010f
-
SHA256
ea818cdf1f7510d8d167f9898e3130f6656960d7bb16a2c938fc43d4f538ea4f
-
SHA512
553a9d10f8ffb2e6b03d144bcda5eb4ab19407e3b365f8c222835e928ccf1b66ba9dfb31afbadfa885e0cb0a5f4c46b96a915d7cc02f9caa5b2891f1f049b4a7
-
SSDEEP
3072:yGkx3zz8yFuVZa5STVjSec0D5B7gl98XY4gK5m0VQi0U:yGkJAsuVZVjSec0DjklKfmk0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2292 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1832 csssssrtr.exe 1628 csssssrtr.exe -
Loads dropped DLL 2 IoCs
pid Process 2588 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe 2588 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csssssrtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csssssrtr.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Sale csssssrtr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1628 csssssrtr.exe Token: SeRestorePrivilege 1628 csssssrtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2588 wrote to memory of 1832 2588 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe 31 PID 2588 wrote to memory of 1832 2588 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe 31 PID 2588 wrote to memory of 1832 2588 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe 31 PID 2588 wrote to memory of 1832 2588 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe 31 PID 2588 wrote to memory of 2292 2588 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe 33 PID 2588 wrote to memory of 2292 2588 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe 33 PID 2588 wrote to memory of 2292 2588 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe 33 PID 2588 wrote to memory of 2292 2588 44ed37df880b56f52a1149354083d167_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\44ed37df880b56f52a1149354083d167_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44ed37df880b56f52a1149354083d167_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\temp\csssssrtr.exe"C:\Windows\temp\csssssrtr.exe" -install2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\~0.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\temp\csssssrtr.exeC:\Windows\temp\csssssrtr.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD5d5d50b17b4afa4a444b9fc5ba88519db
SHA113e960a782f72b024babf38f3d240003ac626987
SHA256fbe5cfb4b23bdcf2e7205ac8f7507ebc3ef886e38b297f8155975a0841904b86
SHA5121b12eaf7b5646b99f8b6780746da090de8f4c2e47afb17643a2117ae10f45474309db78ed3e3e9ee76449045c3b1708006f999de33c8e7a0c792575b5ef57042
-
Filesize
184KB
MD544ed37df880b56f52a1149354083d167
SHA1c41d9728dbc6aa51f3f88755b7c1e072f80e010f
SHA256ea818cdf1f7510d8d167f9898e3130f6656960d7bb16a2c938fc43d4f538ea4f
SHA512553a9d10f8ffb2e6b03d144bcda5eb4ab19407e3b365f8c222835e928ccf1b66ba9dfb31afbadfa885e0cb0a5f4c46b96a915d7cc02f9caa5b2891f1f049b4a7