Analysis
-
max time kernel
150s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2024, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
6c9e9cc367698595e74d1ebb80488faa
-
SHA1
d367f2c47f611939b97efb96bfaff69a048b5107
-
SHA256
bd4419248eef2c6dd4f4a353b3b8cea834b58f34720f2c2b6208d3137131882e
-
SHA512
3bb47ebe4a9ffdc18270ccd7b8e1110a02fe722a9c281ad5b5d2bc0e0623bec3412127b70f2be1dceafab5d52103aaebb6e6c4107406ea97eaaf1039febea956
-
SSDEEP
12288:GeXWw5rArh3i/5hzJTIuN7w92L7FAQB+4H6IKZDIZLgsOnBCHuVSerxaE6Kka/wE:v/5eyPrFfi54HQDEL7qxnsU3SY
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wVGepv4fIw0W3nl53.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3016 wVGepv4fIw0W3nl53.exe 2964 93dDu9MUySJlsggM8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wVGepv4fIw0W3nl53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93dDu9MUySJlsggM8.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wVGepv4fIw0W3nl53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wVGepv4fIw0W3nl53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wVGepv4fIw0W3nl53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier wVGepv4fIw0W3nl53.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wVGepv4fIw0W3nl53.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1204 6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeSecurityPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeTakeOwnershipPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeLoadDriverPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeSystemProfilePrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeSystemtimePrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeProfSingleProcessPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeIncBasePriorityPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeCreatePagefilePrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeBackupPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeRestorePrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeShutdownPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeDebugPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeSystemEnvironmentPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeChangeNotifyPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeRemoteShutdownPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeUndockPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeManageVolumePrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeImpersonatePrivilege 3016 wVGepv4fIw0W3nl53.exe Token: SeCreateGlobalPrivilege 3016 wVGepv4fIw0W3nl53.exe Token: 33 3016 wVGepv4fIw0W3nl53.exe Token: 34 3016 wVGepv4fIw0W3nl53.exe Token: 35 3016 wVGepv4fIw0W3nl53.exe Token: 36 3016 wVGepv4fIw0W3nl53.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1204 wrote to memory of 3016 1204 6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe 84 PID 1204 wrote to memory of 3016 1204 6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe 84 PID 1204 wrote to memory of 3016 1204 6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe 84 PID 1204 wrote to memory of 2964 1204 6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe 85 PID 1204 wrote to memory of 2964 1204 6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe 85 PID 1204 wrote to memory of 2964 1204 6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe 85 PID 3016 wrote to memory of 4052 3016 wVGepv4fIw0W3nl53.exe 86 PID 3016 wrote to memory of 4052 3016 wVGepv4fIw0W3nl53.exe 86 PID 3016 wrote to memory of 4052 3016 wVGepv4fIw0W3nl53.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6c9e9cc367698595e74d1ebb80488faa_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\wVGepv4fIw0W3nl53.exe"C:\Users\Admin\AppData\Local\Temp\wVGepv4fIw0W3nl53.exe"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:4052
-
-
-
C:\Users\Admin\AppData\Local\Temp\93dDu9MUySJlsggM8.exe"C:\Users\Admin\AppData\Local\Temp\93dDu9MUySJlsggM8.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
679KB
MD5605a171c61a0607bdcf6be80ed07cf95
SHA1477d4391b0d84406127e43ead289a3596ac1e5e5
SHA25609b78dc85713ca0f27f17d94c939cc606a59847c1f2b5cdd281b52a48cdaeab9
SHA5123b32197d76951d0e1cd7043758af9b33be12b30c03df00a3ef36078205fa95b1582f65bdf4437a1b879a922d2950868e905bcd2227ce3816d5437556b103d338
-
Filesize
635KB
MD5dac515e4995d35e9e96f745957040d4d
SHA156285d7669dc2686ccbfa6403d590cb5eb7c4f8c
SHA2564e5f9fad34dcae36fda683d1c0517bac1d62d15ea30dc31cc46930801d048ec6
SHA51268ae67edb6c50a8a36767d1efa413d60ebd6287e52b08ec9935e15b188fb04e5856537ba4d3d9fe27eb0ea59ca17a9dc712ce89ae7cd6b609cab5b41295102d5