Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2024, 11:49
Behavioral task
behavioral1
Sample
66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe
-
Size
381KB
-
MD5
66a296ff8e17020c80cc61f50931ff33
-
SHA1
13b1b3a05a6bfe43e69ac419537509db02e675fb
-
SHA256
1172f9a769ad61689bddae58882645f5ccd37ed2881a096fe23d5c120ea20fff
-
SHA512
b2ad4f4ea38917bd85072bf590a5e3b305e11944581269fc142ebcf5fb15d456088695ae8c7c5ea7439cd72695a813368b706e4042522b0449a2666adfc97f49
-
SSDEEP
6144:0WVvUX3F1M4icY6u09Sr4RL3gs0P+CriXNBz3DHUEkzl8+We+atGKoS9:xilbcfMS0xg5PvOXN1UDlJJoKoS
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Update.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 868 Update.exe 5008 Update.exe 644 Update.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Roaming\\Java\\Update.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 868 set thread context of 5008 868 Update.exe 99 PID 868 set thread context of 644 868 Update.exe 100 -
resource yara_rule behavioral2/memory/4660-0-0x0000000000400000-0x0000000000705000-memory.dmp upx behavioral2/files/0x000a000000023b80-11.dat upx behavioral2/memory/868-18-0x0000000000400000-0x0000000000705000-memory.dmp upx behavioral2/memory/4660-22-0x0000000000400000-0x0000000000705000-memory.dmp upx behavioral2/memory/868-36-0x0000000000400000-0x0000000000705000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Update.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Update.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 644 Update.exe Token: SeIncreaseQuotaPrivilege 5008 Update.exe Token: SeSecurityPrivilege 5008 Update.exe Token: SeTakeOwnershipPrivilege 5008 Update.exe Token: SeLoadDriverPrivilege 5008 Update.exe Token: SeSystemProfilePrivilege 5008 Update.exe Token: SeSystemtimePrivilege 5008 Update.exe Token: SeProfSingleProcessPrivilege 5008 Update.exe Token: SeIncBasePriorityPrivilege 5008 Update.exe Token: SeCreatePagefilePrivilege 5008 Update.exe Token: SeBackupPrivilege 5008 Update.exe Token: SeRestorePrivilege 5008 Update.exe Token: SeShutdownPrivilege 5008 Update.exe Token: SeDebugPrivilege 5008 Update.exe Token: SeSystemEnvironmentPrivilege 5008 Update.exe Token: SeChangeNotifyPrivilege 5008 Update.exe Token: SeRemoteShutdownPrivilege 5008 Update.exe Token: SeUndockPrivilege 5008 Update.exe Token: SeManageVolumePrivilege 5008 Update.exe Token: SeImpersonatePrivilege 5008 Update.exe Token: SeCreateGlobalPrivilege 5008 Update.exe Token: 33 5008 Update.exe Token: 34 5008 Update.exe Token: 35 5008 Update.exe Token: 36 5008 Update.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4660 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 868 Update.exe 644 Update.exe 5008 Update.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4660 wrote to memory of 976 4660 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 86 PID 4660 wrote to memory of 976 4660 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 86 PID 4660 wrote to memory of 976 4660 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 86 PID 976 wrote to memory of 3992 976 cmd.exe 90 PID 976 wrote to memory of 3992 976 cmd.exe 90 PID 976 wrote to memory of 3992 976 cmd.exe 90 PID 4660 wrote to memory of 868 4660 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 91 PID 4660 wrote to memory of 868 4660 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 91 PID 4660 wrote to memory of 868 4660 66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe 91 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 5008 868 Update.exe 99 PID 868 wrote to memory of 644 868 Update.exe 100 PID 868 wrote to memory of 644 868 Update.exe 100 PID 868 wrote to memory of 644 868 Update.exe 100 PID 868 wrote to memory of 644 868 Update.exe 100 PID 868 wrote to memory of 644 868 Update.exe 100 PID 868 wrote to memory of 644 868 Update.exe 100 PID 868 wrote to memory of 644 868 Update.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kHXdG.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Java" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Java\Update.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3992
-
-
-
C:\Users\Admin\AppData\Roaming\Java\Update.exe"C:\Users\Admin\AppData\Roaming\Java\Update.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Roaming\Java\Update.exe"C:\Users\Admin\AppData\Roaming\Java\Update.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5008
-
-
C:\Users\Admin\AppData\Roaming\Java\Update.exe"C:\Users\Admin\AppData\Roaming\Java\Update.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5878503b054ecc45e70d4274136245fe8
SHA1f1c15d59a5620dfa20041aa8caa5ac1829bd8f71
SHA256332c8681c2e2844846534c24c7e29966e3d597ec64eb667693a5fe37919a132b
SHA5127978e2d23a70ce25fbfe40a149b929f7df0cf54cc90f2c506a31a39c6caa517dd4954a9e86b83a979b4154b2a8b94bd827f4767b8981f8dc268d3fa0d957eb25
-
Filesize
381KB
MD566a296ff8e17020c80cc61f50931ff33
SHA113b1b3a05a6bfe43e69ac419537509db02e675fb
SHA2561172f9a769ad61689bddae58882645f5ccd37ed2881a096fe23d5c120ea20fff
SHA512b2ad4f4ea38917bd85072bf590a5e3b305e11944581269fc142ebcf5fb15d456088695ae8c7c5ea7439cd72695a813368b706e4042522b0449a2666adfc97f49