Analysis
-
max time kernel
7s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe
-
Size
90KB
-
MD5
54e0b0172b252617b3fb96f6e899eff3
-
SHA1
b46e5c4f484fb43d47de75a5b2fd26558335d3c7
-
SHA256
b48326823cad0a141724e6c6d8a8d0a1f3fd5195a1aed03354a2ccadaf873c38
-
SHA512
b5d3c85b702b50ecf61947c76cd3665654a7cd81ee203b9bc3c0aaaa52c738562c0d74542f54fb7497155fb5245cdc14063ebc9e46d6146edc33b4ce67e5044f
-
SSDEEP
1536:hgYPhQXwIiPrrjThO+lUBrzCxry1ec7rUyj239auh53RdXFwW:KYP2XerzhOUxu/XUtauzDFwW
Malware Config
Signatures
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2816 shutdown.exe Token: SeRemoteShutdownPrivilege 2816 shutdown.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2660 2980 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2660 2980 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2660 2980 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2660 2980 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2660 2980 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2660 2980 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2660 2980 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2812 2660 cmd.exe 33 PID 2660 wrote to memory of 2812 2660 cmd.exe 33 PID 2660 wrote to memory of 2812 2660 cmd.exe 33 PID 2660 wrote to memory of 2812 2660 cmd.exe 33 PID 2660 wrote to memory of 2812 2660 cmd.exe 33 PID 2660 wrote to memory of 2812 2660 cmd.exe 33 PID 2660 wrote to memory of 2812 2660 cmd.exe 33 PID 2660 wrote to memory of 2816 2660 cmd.exe 34 PID 2660 wrote to memory of 2816 2660 cmd.exe 34 PID 2660 wrote to memory of 2816 2660 cmd.exe 34 PID 2660 wrote to memory of 2816 2660 cmd.exe 34 PID 2660 wrote to memory of 2816 2660 cmd.exe 34 PID 2660 wrote to memory of 2816 2660 cmd.exe 34 PID 2660 wrote to memory of 2816 2660 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\Windows\system32\hal.dll /f /q3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 05 -c "Good bye, my love, good bye"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2712
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99B
MD506c5ae8cc629f30b31b0384f5d2d979a
SHA1d3742c22ef6687907d9ef91cb69ebe337130bef7
SHA2560ea0719b9de4b8876d7f7128a3133f4eaed3dddeaa8a2b702d0285fa5d1a6e4a
SHA512f55ab1c047aee51a38b0da0d844f07b5cb633d1ad3ecfb035fa956c94b0c2732a59e8236e53ddacef9286795b37074f20e6283bba40bcf29dbf98baf8b799975