Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe
-
Size
128KB
-
MD5
453b4d05999aff7e482ac414d757f677
-
SHA1
b4460e0a79ab5255b79b83aeb836178badc9b2c8
-
SHA256
de3cad83d0a8261713f911354f076213b17749a4e1da01c3c909067968fad34a
-
SHA512
91cda3e94e57561cd7d4ccf12ed8b11b691e1328ceb112fb9eefdd07941dea3e664eef6671f6d39356e13b4bccfc0ad56464be3fa34b3f6fad4f1625b38ddfc2
-
SSDEEP
3072:aNCqtePrHSNKkUIZ7NQ09YhLFFoJbOVtc:g8zSNf7Z7W0eRoJktc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2860 taskhost.exe 2696 taskhost.exe -
Loads dropped DLL 3 IoCs
pid Process 2692 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 2692 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 2860 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1448 set thread context of 2692 1448 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 30 PID 2860 set thread context of 2696 2860 taskhost.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2692 1448 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2692 1448 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2692 1448 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2692 1448 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2692 1448 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2692 1448 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2860 2692 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2860 2692 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2860 2692 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2860 2692 453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe 31 PID 2860 wrote to memory of 2696 2860 taskhost.exe 32 PID 2860 wrote to memory of 2696 2860 taskhost.exe 32 PID 2860 wrote to memory of 2696 2860 taskhost.exe 32 PID 2860 wrote to memory of 2696 2860 taskhost.exe 32 PID 2860 wrote to memory of 2696 2860 taskhost.exe 32 PID 2860 wrote to memory of 2696 2860 taskhost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\453b4d05999aff7e482ac414d757f677_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\453b4d05999aff7e482ac414d757f677_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:2696
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD575e22e22be3c173d879d459bb0a51f2c
SHA10ba943a188c58ebdffad7de4177dfd324c7f6924
SHA256e212b747abb35766a73dfa485e69e910bd2710ac15fd33882ba41252f557bd5f
SHA512873fd9d6597f1594acd300d455986607350d0eb373d797ba72e79ebb512063542454a153f5a655447aeffc967e911e7bbeb02bbfb52e78c19956e95d84c6811e