Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/10/2024, 11:49
Behavioral task
behavioral1
Sample
66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe
-
Size
381KB
-
MD5
66a296ff8e17020c80cc61f50931ff33
-
SHA1
13b1b3a05a6bfe43e69ac419537509db02e675fb
-
SHA256
1172f9a769ad61689bddae58882645f5ccd37ed2881a096fe23d5c120ea20fff
-
SHA512
b2ad4f4ea38917bd85072bf590a5e3b305e11944581269fc142ebcf5fb15d456088695ae8c7c5ea7439cd72695a813368b706e4042522b0449a2666adfc97f49
-
SSDEEP
6144:0WVvUX3F1M4icY6u09Sr4RL3gs0P+CriXNBz3DHUEkzl8+We+atGKoS9:xilbcfMS0xg5PvOXN1UDlJJoKoS
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Update.exe -
Executes dropped EXE 3 IoCs
pid Process 2692 Update.exe 3040 Update.exe 1996 Update.exe -
Loads dropped DLL 15 IoCs
pid Process 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 2692 Update.exe 2692 Update.exe 2692 Update.exe 2692 Update.exe 2692 Update.exe 1996 Update.exe 1996 Update.exe 1996 Update.exe 3040 Update.exe 3040 Update.exe 3040 Update.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Roaming\\Java\\Update.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2692 set thread context of 3040 2692 Update.exe 34 PID 2692 set thread context of 1996 2692 Update.exe 35 -
resource yara_rule behavioral1/memory/684-0-0x0000000000400000-0x0000000000705000-memory.dmp upx behavioral1/files/0x000800000001612f-20.dat upx behavioral1/memory/684-36-0x0000000000400000-0x0000000000705000-memory.dmp upx behavioral1/memory/684-31-0x0000000004260000-0x0000000004565000-memory.dmp upx behavioral1/memory/2692-43-0x0000000000400000-0x0000000000705000-memory.dmp upx behavioral1/memory/2692-72-0x0000000000400000-0x0000000000705000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Update.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Update.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1996 Update.exe Token: SeIncreaseQuotaPrivilege 3040 Update.exe Token: SeSecurityPrivilege 3040 Update.exe Token: SeTakeOwnershipPrivilege 3040 Update.exe Token: SeLoadDriverPrivilege 3040 Update.exe Token: SeSystemProfilePrivilege 3040 Update.exe Token: SeSystemtimePrivilege 3040 Update.exe Token: SeProfSingleProcessPrivilege 3040 Update.exe Token: SeIncBasePriorityPrivilege 3040 Update.exe Token: SeCreatePagefilePrivilege 3040 Update.exe Token: SeBackupPrivilege 3040 Update.exe Token: SeRestorePrivilege 3040 Update.exe Token: SeShutdownPrivilege 3040 Update.exe Token: SeDebugPrivilege 3040 Update.exe Token: SeSystemEnvironmentPrivilege 3040 Update.exe Token: SeChangeNotifyPrivilege 3040 Update.exe Token: SeRemoteShutdownPrivilege 3040 Update.exe Token: SeUndockPrivilege 3040 Update.exe Token: SeManageVolumePrivilege 3040 Update.exe Token: SeImpersonatePrivilege 3040 Update.exe Token: SeCreateGlobalPrivilege 3040 Update.exe Token: 33 3040 Update.exe Token: 34 3040 Update.exe Token: 35 3040 Update.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 2692 Update.exe 1996 Update.exe 3040 Update.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 684 wrote to memory of 2688 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 30 PID 684 wrote to memory of 2688 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 30 PID 684 wrote to memory of 2688 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 30 PID 684 wrote to memory of 2688 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 30 PID 2688 wrote to memory of 1352 2688 cmd.exe 32 PID 2688 wrote to memory of 1352 2688 cmd.exe 32 PID 2688 wrote to memory of 1352 2688 cmd.exe 32 PID 2688 wrote to memory of 1352 2688 cmd.exe 32 PID 684 wrote to memory of 2692 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 33 PID 684 wrote to memory of 2692 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 33 PID 684 wrote to memory of 2692 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 33 PID 684 wrote to memory of 2692 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 33 PID 684 wrote to memory of 2692 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 33 PID 684 wrote to memory of 2692 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 33 PID 684 wrote to memory of 2692 684 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 33 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 3040 2692 Update.exe 34 PID 2692 wrote to memory of 1996 2692 Update.exe 35 PID 2692 wrote to memory of 1996 2692 Update.exe 35 PID 2692 wrote to memory of 1996 2692 Update.exe 35 PID 2692 wrote to memory of 1996 2692 Update.exe 35 PID 2692 wrote to memory of 1996 2692 Update.exe 35 PID 2692 wrote to memory of 1996 2692 Update.exe 35 PID 2692 wrote to memory of 1996 2692 Update.exe 35 PID 2692 wrote to memory of 1996 2692 Update.exe 35 PID 2692 wrote to memory of 1996 2692 Update.exe 35 PID 2692 wrote to memory of 1996 2692 Update.exe 35 PID 2692 wrote to memory of 1996 2692 Update.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\obNel.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Java" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Java\Update.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1352
-
-
-
C:\Users\Admin\AppData\Roaming\Java\Update.exe"C:\Users\Admin\AppData\Roaming\Java\Update.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\Java\Update.exe"C:\Users\Admin\AppData\Roaming\Java\Update.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3040
-
-
C:\Users\Admin\AppData\Roaming\Java\Update.exe"C:\Users\Admin\AppData\Roaming\Java\Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5878503b054ecc45e70d4274136245fe8
SHA1f1c15d59a5620dfa20041aa8caa5ac1829bd8f71
SHA256332c8681c2e2844846534c24c7e29966e3d597ec64eb667693a5fe37919a132b
SHA5127978e2d23a70ce25fbfe40a149b929f7df0cf54cc90f2c506a31a39c6caa517dd4954a9e86b83a979b4154b2a8b94bd827f4767b8981f8dc268d3fa0d957eb25
-
Filesize
381KB
MD566a296ff8e17020c80cc61f50931ff33
SHA113b1b3a05a6bfe43e69ac419537509db02e675fb
SHA2561172f9a769ad61689bddae58882645f5ccd37ed2881a096fe23d5c120ea20fff
SHA512b2ad4f4ea38917bd85072bf590a5e3b305e11944581269fc142ebcf5fb15d456088695ae8c7c5ea7439cd72695a813368b706e4042522b0449a2666adfc97f49