Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe
-
Size
112KB
-
MD5
5708a50b72ed61ea57d21a11d0ff9260
-
SHA1
d41e2931d5f7a595253e65eeca27a12940b948b2
-
SHA256
8983f6c89f99d99042d339ed0622d120418276ec1f1d0e5444d9d3e8e12ba2af
-
SHA512
722da46b53e4d5f9ac030c7086c1ac63ab3f390383fe9a7365bcddba98b506f826d8b4412faf53089a63540423bb6beb2d7148399ddf794f50a1c409995f52e9
-
SSDEEP
1536:LPqKgbwDeVyAUHwGvVJrYJeyxWxVhkITI5ywWFfB8lBTxe5P1PU:9gbwDKyLwGvTrYkg6BJR6ns5PFU
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4436 set thread context of 5068 4436 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 88 PID 5068 set thread context of 4996 5068 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 89 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\3Tck7Kuvk.exe 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\3Tck7Kuvk.exe 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4996 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 4996 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4436 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4436 wrote to memory of 5068 4436 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 88 PID 4436 wrote to memory of 5068 4436 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 88 PID 4436 wrote to memory of 5068 4436 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 88 PID 4436 wrote to memory of 5068 4436 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 88 PID 4436 wrote to memory of 5068 4436 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 88 PID 4436 wrote to memory of 5068 4436 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 88 PID 4436 wrote to memory of 5068 4436 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 88 PID 4436 wrote to memory of 5068 4436 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 88 PID 5068 wrote to memory of 4996 5068 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 89 PID 5068 wrote to memory of 4996 5068 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 89 PID 5068 wrote to memory of 4996 5068 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 89 PID 5068 wrote to memory of 4996 5068 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 89 PID 5068 wrote to memory of 4996 5068 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 89 PID 5068 wrote to memory of 4996 5068 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 89 PID 5068 wrote to memory of 4996 5068 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 89 PID 5068 wrote to memory of 4996 5068 5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5708a50b72ed61ea57d21a11d0ff9260_JaffaCakes118.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4876