Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/11/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe
-
Size
84KB
-
MD5
9292c01026392c900b72e4bc543ee4d1
-
SHA1
76563158b9f884fad61632e8eb30b7063de4b467
-
SHA256
d88d7e3bdaad0b97a1e7e139b464a5464ee28d5b70ebb055a4f5e12b18c6342c
-
SHA512
bfe9047ae353f3f9696209897ab1b5d34d5faa1117cd50bddd144773fc13edd487add63a8f2d8c825fa2c0e846c8a4ff4c9616c6847d64b7cf978031966e0d5e
-
SSDEEP
1536:N08QMDAozYeVWnJOz2Swc/KbCi7RTuEEfhxwzi3rIEzdnjuhbh:lDxWnJOz1GbCaTuEehxwzUrI6dnjuhbh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2420 CertPolEng.exe 2956 panmap.exe -
Loads dropped DLL 3 IoCs
pid Process 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2420 CertPolEng.exe 2956 panmap.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Certificate Policy Engine = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\CertPolEng.exe" CertPolEng.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CertPolEng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language panmap.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2420 CertPolEng.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2956 panmap.exe 2956 panmap.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2956 panmap.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2956 panmap.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2956 panmap.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2956 panmap.exe 2956 panmap.exe 2956 panmap.exe 2956 panmap.exe 2956 panmap.exe 2956 panmap.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2956 panmap.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2956 panmap.exe 2956 panmap.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2956 panmap.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2956 panmap.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe Token: SeDebugPrivilege 2420 CertPolEng.exe Token: SeDebugPrivilege 2956 panmap.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2156 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2156 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2156 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2156 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2156 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2156 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2156 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2420 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 31 PID 2116 wrote to memory of 2420 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 31 PID 2116 wrote to memory of 2420 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 31 PID 2116 wrote to memory of 2420 2116 9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe 31 PID 2420 wrote to memory of 2956 2420 CertPolEng.exe 32 PID 2420 wrote to memory of 2956 2420 CertPolEng.exe 32 PID 2420 wrote to memory of 2956 2420 CertPolEng.exe 32 PID 2420 wrote to memory of 2956 2420 CertPolEng.exe 32 PID 2420 wrote to memory of 2956 2420 CertPolEng.exe 32 PID 2420 wrote to memory of 2956 2420 CertPolEng.exe 32 PID 2420 wrote to memory of 2956 2420 CertPolEng.exe 32 PID 2956 wrote to memory of 2324 2956 panmap.exe 33 PID 2956 wrote to memory of 2324 2956 panmap.exe 33 PID 2956 wrote to memory of 2324 2956 panmap.exe 33 PID 2956 wrote to memory of 2324 2956 panmap.exe 33 PID 2956 wrote to memory of 2324 2956 panmap.exe 33 PID 2956 wrote to memory of 2324 2956 panmap.exe 33 PID 2956 wrote to memory of 2324 2956 panmap.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe2⤵PID:2156
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CertPolEng.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CertPolEng.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\panmap.exeC:\Users\Admin\AppData\Local\Temp\\panmap.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\panmap.exeC:\Users\Admin\AppData\Local\Temp\panmap.exe4⤵PID:2324
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD59292c01026392c900b72e4bc543ee4d1
SHA176563158b9f884fad61632e8eb30b7063de4b467
SHA256d88d7e3bdaad0b97a1e7e139b464a5464ee28d5b70ebb055a4f5e12b18c6342c
SHA512bfe9047ae353f3f9696209897ab1b5d34d5faa1117cd50bddd144773fc13edd487add63a8f2d8c825fa2c0e846c8a4ff4c9616c6847d64b7cf978031966e0d5e
-
Filesize
6KB
MD509050857004e30fc1235827a82aa849c
SHA18b656860644de40992999db81e48078882dbe3d9
SHA2562bcea9ed1bcafdd3796cecf86ff868539ee278eb257c20617440aac9fa5eada9
SHA51248221e78007ce8f5a423898fec15651cc1af309aac28a9140bfcf69d1de2051e77a77c39267c425e4bb7f33d8fe8e46b27e37f081f373c25c4967e0467006f9f