Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe
-
Size
571KB
-
MD5
9ead56f9350f3516c20393d444c4d7ed
-
SHA1
7001b8e3324fa30b3bdcf516ef0d56e9702b9a80
-
SHA256
d3257ae8197f50ea531263f79ec829700c8a114ea5326551bae26bdaac61d06e
-
SHA512
df26a28ffe9e17bfeeef87eda2142f00ec797d914e5c6fac74dc5695222834341270a24d0e845a78c55f57ee34af5980c9372c846e8a2667b0b51cb2ea5cbc41
-
SSDEEP
12288:5MMnglWkhK70cEbt/yoQSMPi2JIU87W/vTdg+OKQ2HqnSlsfE8x:5M44WkhA0LlyoQSMP3JI2vTdgCyH8c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ko2233.exepid process 1872 ko2233.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 2 IoCs
Processes:
ko2233.exedescription ioc process File created C:\Program Files\NetMeeting\win.vbs ko2233.exe File opened for modification C:\Program Files\NetMeeting\win.vbs ko2233.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ko2233.exeregedit.execmd.exe9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ko2233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 640 regedit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ko2233.exepid process 1872 ko2233.exe 1872 ko2233.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exeko2233.exedescription pid process target process PID 4040 wrote to memory of 1872 4040 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe ko2233.exe PID 4040 wrote to memory of 1872 4040 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe ko2233.exe PID 4040 wrote to memory of 1872 4040 9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe ko2233.exe PID 1872 wrote to memory of 640 1872 ko2233.exe regedit.exe PID 1872 wrote to memory of 640 1872 ko2233.exe regedit.exe PID 1872 wrote to memory of 640 1872 ko2233.exe regedit.exe PID 1872 wrote to memory of 1496 1872 ko2233.exe cmd.exe PID 1872 wrote to memory of 1496 1872 ko2233.exe cmd.exe PID 1872 wrote to memory of 1496 1872 ko2233.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9ead56f9350f3516c20393d444c4d7ed_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\ProgramData\ko2233.exeC:\ProgramData\ko2233.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\WINDOWS\temp\tmp.reg3⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:640
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del ko2233.exe3⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD55555a8f5c2656185a9385981a24db0f3
SHA1cccdbf7cced5abf7811a242c573ad88cab7f11c6
SHA256eb3cc01ad47d40a9a67ceaa3f88f9aca907ccdbc6f0b186a616b27d78b8bd778
SHA512ca31e2976484e88636165ecdf66d999625dcc5964a24d6be9d85539d6bedb1adb51d43d9a573b3e7869dfade5998a898d25c039109dd7482ba846bbf65e956c5
-
Filesize
1KB
MD5a95044fc8bd71a6ecdd487f2a30f1d4e
SHA10e1ba880fdc2ac01b84febdbb4b5325a5ecfc706
SHA25677730b194cf461a72285734ae3aafa83b435bb6b5587f31779f2ef5e43666906
SHA512ee8d894e25716c5b54809855ca73ae680dee9b01478cbd8b9417d3d388448df496b27c1f7ab75a9757dc76d8e41ad1a64a5a720e249fcd9a25707ccda5f6692d