Analysis
-
max time kernel
34s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe
-
Size
571KB
-
MD5
9ead56f9350f3516c20393d444c4d7ed
-
SHA1
7001b8e3324fa30b3bdcf516ef0d56e9702b9a80
-
SHA256
d3257ae8197f50ea531263f79ec829700c8a114ea5326551bae26bdaac61d06e
-
SHA512
df26a28ffe9e17bfeeef87eda2142f00ec797d914e5c6fac74dc5695222834341270a24d0e845a78c55f57ee34af5980c9372c846e8a2667b0b51cb2ea5cbc41
-
SSDEEP
12288:5MMnglWkhK70cEbt/yoQSMPi2JIU87W/vTdg+OKQ2HqnSlsfE8x:5M44WkhA0LlyoQSMP3JI2vTdgCyH8c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ko2233.exepid process 2424 ko2233.exe -
Loads dropped DLL 5 IoCs
Processes:
9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exeko2233.exepid process 2536 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe 2536 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe 2424 ko2233.exe 2424 ko2233.exe 2424 ko2233.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 2 IoCs
Processes:
ko2233.exedescription ioc process File created C:\Program Files\NetMeeting\win.vbs ko2233.exe File opened for modification C:\Program Files\NetMeeting\win.vbs ko2233.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exeko2233.exeregedit.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ko2233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 2724 regedit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ko2233.exepid process 2424 ko2233.exe 2424 ko2233.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exeko2233.exedescription pid process target process PID 2536 wrote to memory of 2424 2536 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe ko2233.exe PID 2536 wrote to memory of 2424 2536 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe ko2233.exe PID 2536 wrote to memory of 2424 2536 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe ko2233.exe PID 2536 wrote to memory of 2424 2536 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe ko2233.exe PID 2536 wrote to memory of 2424 2536 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe ko2233.exe PID 2536 wrote to memory of 2424 2536 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe ko2233.exe PID 2536 wrote to memory of 2424 2536 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe ko2233.exe PID 2424 wrote to memory of 2724 2424 ko2233.exe regedit.exe PID 2424 wrote to memory of 2724 2424 ko2233.exe regedit.exe PID 2424 wrote to memory of 2724 2424 ko2233.exe regedit.exe PID 2424 wrote to memory of 2724 2424 ko2233.exe regedit.exe PID 2424 wrote to memory of 2724 2424 ko2233.exe regedit.exe PID 2424 wrote to memory of 2724 2424 ko2233.exe regedit.exe PID 2424 wrote to memory of 2724 2424 ko2233.exe regedit.exe PID 2424 wrote to memory of 2560 2424 ko2233.exe cmd.exe PID 2424 wrote to memory of 2560 2424 ko2233.exe cmd.exe PID 2424 wrote to memory of 2560 2424 ko2233.exe cmd.exe PID 2424 wrote to memory of 2560 2424 ko2233.exe cmd.exe PID 2424 wrote to memory of 2560 2424 ko2233.exe cmd.exe PID 2424 wrote to memory of 2560 2424 ko2233.exe cmd.exe PID 2424 wrote to memory of 2560 2424 ko2233.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\ProgramData\ko2233.exeC:\ProgramData\ko2233.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\WINDOWS\temp\tmp.reg3⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2724
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del ko2233.exe3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a95044fc8bd71a6ecdd487f2a30f1d4e
SHA10e1ba880fdc2ac01b84febdbb4b5325a5ecfc706
SHA25677730b194cf461a72285734ae3aafa83b435bb6b5587f31779f2ef5e43666906
SHA512ee8d894e25716c5b54809855ca73ae680dee9b01478cbd8b9417d3d388448df496b27c1f7ab75a9757dc76d8e41ad1a64a5a720e249fcd9a25707ccda5f6692d
-
Filesize
1.2MB
MD55555a8f5c2656185a9385981a24db0f3
SHA1cccdbf7cced5abf7811a242c573ad88cab7f11c6
SHA256eb3cc01ad47d40a9a67ceaa3f88f9aca907ccdbc6f0b186a616b27d78b8bd778
SHA512ca31e2976484e88636165ecdf66d999625dcc5964a24d6be9d85539d6bedb1adb51d43d9a573b3e7869dfade5998a898d25c039109dd7482ba846bbf65e956c5