Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe
-
Size
114KB
-
MD5
810132d096e4a90fffdcbec370fb4954
-
SHA1
43eb66678e036d09b18c0388331bc6e5c3815d22
-
SHA256
4d94cfc56febc282da0ed34cacc64284940e0c82c33843a93d7949b056106587
-
SHA512
25e1bd903ec9651fe233678c6de27c6d02621f89850e7742125be1f8f43fc0311d12df4177a52f9366bdfab2345f8cfbaa74caed4118bee45b3f5939e1ab7836
-
SSDEEP
1536:8EGqhhCwfeZO/ZBLwjinTIHA70tphBp9jZiBvElEp3GWtbpVeDrmIv0eY2Fy8z:3GqmzORYiTkA6TBHjZiVZ5pKzL/Y8z
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\WINDÎWS\\åõðlîrår.exe" åõðlîrår.exe -
Executes dropped EXE 1 IoCs
pid Process 1884 åõðlîrår.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc åõðlîrår.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power åõðlîrår.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend åõðlîrår.exe -
Loads dropped DLL 2 IoCs
pid Process 1372 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe 1372 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\C:\WINDÎWS\åõðlîrår.exe = "C:\\WINDÎWS\\åõðlîrår.exe" åõðlîrår.exe -
resource yara_rule behavioral1/memory/1372-2-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1884-13-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1372-15-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1884-17-0x0000000000400000-0x000000000042E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language åõðlîrår.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2504 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2504 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1884 1372 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe 30 PID 1372 wrote to memory of 1884 1372 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe 30 PID 1372 wrote to memory of 1884 1372 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe 30 PID 1372 wrote to memory of 1884 1372 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe 30 PID 1884 wrote to memory of 2504 1884 åõðlîrår.exe 31 PID 1884 wrote to memory of 2504 1884 åõðlîrår.exe 31 PID 1884 wrote to memory of 2504 1884 åõðlîrår.exe 31 PID 1884 wrote to memory of 2504 1884 åõðlîrår.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\WINDÎWS\åõðlîrår.exeC:\WINDÎWS\åõðlîrår.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5810132d096e4a90fffdcbec370fb4954
SHA143eb66678e036d09b18c0388331bc6e5c3815d22
SHA2564d94cfc56febc282da0ed34cacc64284940e0c82c33843a93d7949b056106587
SHA51225e1bd903ec9651fe233678c6de27c6d02621f89850e7742125be1f8f43fc0311d12df4177a52f9366bdfab2345f8cfbaa74caed4118bee45b3f5939e1ab7836