Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 04:39
Behavioral task
behavioral1
Sample
77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe
-
Size
99KB
-
MD5
77ba75bdf083338fce2eb652e2ad83ce
-
SHA1
6185ed1cae13e1b8811746f5a53a70506670310b
-
SHA256
32f62934baccdc9959347f7f83e43787f13fad4ead2ec310ff863130cb08f3fc
-
SHA512
a9de600e39502687410fe2c27fab9c687c7ca379219f3264d24036f142003d293082c363bbdfd4f2017a53f23b64a558d40c39df97cbf9ae63d94c14573aed00
-
SSDEEP
1536:Roaj1hJL1S9t0MIeboal8bCKxo7h0RPSaml0Nz30rtrd8G:i0hpgz6xGhpamyF30B58G
Malware Config
Signatures
-
Sakula family
-
Sakula payload 5 IoCs
resource yara_rule behavioral1/memory/1632-1-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula behavioral1/files/0x0008000000015db6-2.dat family_sakula behavioral1/memory/2540-11-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula behavioral1/memory/2540-14-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula behavioral1/memory/1632-15-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2800 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 MediaCenter.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2800 cmd.exe 1984 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1984 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2540 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe 30 PID 1632 wrote to memory of 2540 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe 30 PID 1632 wrote to memory of 2540 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe 30 PID 1632 wrote to memory of 2540 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe 30 PID 1632 wrote to memory of 2800 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe 33 PID 1632 wrote to memory of 2800 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe 33 PID 1632 wrote to memory of 2800 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe 33 PID 1632 wrote to memory of 2800 1632 77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe 33 PID 2800 wrote to memory of 1984 2800 cmd.exe 35 PID 2800 wrote to memory of 1984 2800 cmd.exe 35 PID 2800 wrote to memory of 1984 2800 cmd.exe 35 PID 2800 wrote to memory of 1984 2800 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2540
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\77ba75bdf083338fce2eb652e2ad83ce_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1984
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5f265f4388853271a97a32af3803f6c7d
SHA169eef08f79285252fe9a3c2f00ecd9d7f5a4910a
SHA256647bb7c883cd0102d80f560c8692ce84bb6666291a0e5c0828f0eaf8a9ebbc5b
SHA5123052906bbf0820871e7d00cc298e4f88e9231aecce96079e4601e9528baef1c1ea11a01c102329ad16de91fc11821ad8cccc03c815038fdf0b31018a9a8aba62