Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe
-
Size
418KB
-
MD5
56f0e1a4331e8a939b7c582db2ac5c4a
-
SHA1
4e117150a0e27afa7a0ec035a5ea5c3d83463324
-
SHA256
9d29952742354b82cb32d8b8fd3ce6e8cc734cd1c26c7ca5bc3bdc4e94c6d7c7
-
SHA512
68b38f7e56fa0fa823ab62bf99ccd0f3c39461459115bb74414bc555fabf872e32757b08dec9e83059f129e8bc28ce33902c683982162a443183973415575ec7
-
SSDEEP
6144:K1LDhBEUQ2G7E+udcoPv5n68ucAIRRNSoNbh9tjyqhDzyBkfTT9MQrFbF4mp:K1fhtQYh6VcASRNSUt9QifTT2QrP4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2572 gGb21500oOkMi21500.exe -
Executes dropped EXE 2 IoCs
pid Process 2628 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gGb21500oOkMi21500 = "C:\\ProgramData\\gGb21500oOkMi21500\\gGb21500oOkMi21500.exe" gGb21500oOkMi21500.exe -
resource yara_rule behavioral2/memory/636-1-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/2628-16-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/2628-20-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/636-21-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/2572-24-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/2572-31-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/2572-38-0x0000000000400000-0x00000000004C8000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gGb21500oOkMi21500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gGb21500oOkMi21500.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 2628 gGb21500oOkMi21500.exe 2628 gGb21500oOkMi21500.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 2628 gGb21500oOkMi21500.exe 2628 gGb21500oOkMi21500.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 2628 gGb21500oOkMi21500.exe 2628 gGb21500oOkMi21500.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe Token: SeDebugPrivilege 2628 gGb21500oOkMi21500.exe Token: SeDebugPrivilege 2572 gGb21500oOkMi21500.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 gGb21500oOkMi21500.exe 2572 gGb21500oOkMi21500.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 636 wrote to memory of 2628 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 87 PID 636 wrote to memory of 2628 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 87 PID 636 wrote to memory of 2628 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 87 PID 636 wrote to memory of 2572 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 88 PID 636 wrote to memory of 2572 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 88 PID 636 wrote to memory of 2572 636 56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\ProgramData\gGb21500oOkMi21500\gGb21500oOkMi21500.exe"C:\ProgramData\gGb21500oOkMi21500\gGb21500oOkMi21500.exe" BOMBARDAMAXIMUM2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\ProgramData\gGb21500oOkMi21500\gGb21500oOkMi21500.exe"C:\ProgramData\gGb21500oOkMi21500\gGb21500oOkMi21500.exe" "C:\Users\Admin\AppData\Local\Temp\56f0e1a4331e8a939b7c582db2ac5c4a_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5276276238f911cc24836f01eee69d38b
SHA146c02c3ba5ec4e1b2df3b374c530f160ee79af45
SHA256c5d411a071eebcd6a8524bef2176b12c0f9e74803e19c521576f394d0e14fd55
SHA512cd8e0496323d80f634c293cc6e1c30fac4c1055b6257e83a67e57b600a1195ece66ce55b2f5517d81a6b55def25a52cb2247031696eee39dd84ceda897a36a9c
-
Filesize
418KB
MD565e168bdea69eeb8be013df52b3970fa
SHA1899c17899d62cca858c8fff19c2bc8f7b8f81cb7
SHA25677ad54effb33a26d3e711c063fa674868e9e0c0ef9a6c440c476a07f10981601
SHA5124b798c7a0f4154d6c32aba0fb6758c48b827c91c6f53fc749d88d6cd1750725186af541c7967b3caaeebb7dbfe3655ceb30e277ae547790b78419d287586a02a
-
Filesize
192B
MD55df3e45d8fea3be0631fd45f01dcb9f8
SHA177d87fcd655c877fab75014f9fcd7e9a84ce4914
SHA2569620241f9410a627f554e0225d65a9ab6dd46ef3256a3a1d14920e7e87505201
SHA5122e3c4e9f46fd58edcf10ea3e7290a8e28f13fdd84337a9fd35de27d4979bf780da945229415bb95bf0d29138267972a61f8bae362a009d89ec0189cc70f3e775