Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe
-
Size
43KB
-
MD5
5739dbe79ad13da172116252e8ab2bd5
-
SHA1
74dbaa3bd340596a7ae4b4db0c4f23b05c0b7599
-
SHA256
02db4a8253a194514ec3e34591ffa38ffdcaa98279bc5cd2612883eba1455856
-
SHA512
f44cd73e3490c9e98a9a887a6777a8b5a0675a89c783f5e26c9383bd8ce720397ab101a917a8c4c62a4f50eb9a91600d1c922fb21a9e16f78adcf7568f22ba3e
-
SSDEEP
768:z4tNMZqTxHOgfhMWxKvf9m3Ngq3cKcfOpLf+m5qxKIIaKWm:z4ggTxHpuWxMlm3Ngq3BoOpD7aKZ
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\husjdd8s\ImagePath = "C:\\Windows\\system32\\husjdd8s.exe -j" 5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3204 husjdd8s.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\husjdd8s.exe husjdd8s.exe File created C:\Windows\SysWOW64\KillMe.bat 5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe File created C:\Windows\SysWOW64\osiesd3.dll husjdd8s.exe File created C:\Windows\SysWOW64\husjdd8s.exe 5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\husjdd8s.exe 5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language husjdd8s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2352 5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe 2352 5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe 3204 husjdd8s.exe 3204 husjdd8s.exe 3204 husjdd8s.exe 3204 husjdd8s.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2352 wrote to memory of 504 2352 5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe 88 PID 2352 wrote to memory of 504 2352 5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe 88 PID 2352 wrote to memory of 504 2352 5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5739dbe79ad13da172116252e8ab2bd5_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\KillMe.bat2⤵
- System Location Discovery: System Language Discovery
PID:504
-
-
C:\Windows\SysWOW64\husjdd8s.exeC:\Windows\SysWOW64\husjdd8s.exe -j1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD543b836835f3a4ab48bb8784c4e08be18
SHA1c494a0fd9e4355e4476eefaeccb91a0005ccd61c
SHA256b2c19dde5717ce3368a8d2aa4ebe8b70ee7503e865375d7153ff447b1c21d8d6
SHA512cd71b72ded92dd19ae81e30b62a5e23e8864769252d462b1fab6685c8a1d52edda09f7d5b11fcf6c7e7b80365a44a2243bb00d94726512377d3cdc6f3dae9989
-
Filesize
43KB
MD55739dbe79ad13da172116252e8ab2bd5
SHA174dbaa3bd340596a7ae4b4db0c4f23b05c0b7599
SHA25602db4a8253a194514ec3e34591ffa38ffdcaa98279bc5cd2612883eba1455856
SHA512f44cd73e3490c9e98a9a887a6777a8b5a0675a89c783f5e26c9383bd8ce720397ab101a917a8c4c62a4f50eb9a91600d1c922fb21a9e16f78adcf7568f22ba3e