Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe
-
Size
17KB
-
MD5
be5c59b37d57dad8e50e45f8f3b0ce38
-
SHA1
c6e88fc3822a0926090ad1dd02557207c5f04a23
-
SHA256
86f14602208ac8af527879129dd5921709acc8708f4df9a01b9d49819f6d767b
-
SHA512
f511df097d05413984a72746ae8b8b749f0f458ccbe887287e16348485a90f365b0f7a62ef643964dd94793e2fa139834730a74e691ad128552dc759c50140bf
-
SSDEEP
384:HHk2+IjDjClbX/xzEobx8PD5NJEUUNHsMY/G7BQGjkPP7RohY:nkYEb5tePD/JEU0sMY/GqGjIPVohY
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run ishost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\ishost.exe = "ishost.exe" ishost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 5056 ishost.exe 2900 ismon.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ishost.exe be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ishost.exe be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe File created C:\Windows\SysWOW64\ismon.exe ishost.exe File created C:\Windows\SysWOW64\components\flx0.dll ishost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ishost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ismon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1064 be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe 1064 be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe 5056 ishost.exe 5056 ishost.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe 2900 ismon.exe 2900 ismon.exe 5056 ishost.exe 5056 ishost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1064 be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1064 wrote to memory of 5056 1064 be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe 83 PID 1064 wrote to memory of 5056 1064 be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe 83 PID 1064 wrote to memory of 5056 1064 be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe 83 PID 5056 wrote to memory of 2900 5056 ishost.exe 84 PID 5056 wrote to memory of 2900 5056 ishost.exe 84 PID 5056 wrote to memory of 2900 5056 ishost.exe 84 PID 1064 wrote to memory of 3544 1064 be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe 85 PID 1064 wrote to memory of 3544 1064 be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe 85 PID 1064 wrote to memory of 3544 1064 be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\ishost.exeC:\Windows\system32\ishost.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\ismon.exeC:\Windows\system32\ismon.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BE5C59~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5ac66185b0155324ec026c17fa3a73f50
SHA192fe223edf0acb2c6cd1788a663ff72884de0a8b
SHA256e78057f115b67efbd1593485d96cd78af83303429e32443987a760b5a4e7cafa
SHA5121cd25d81ddb2747241840826a52abea14fb383bbd1897239a1e74475403971a37e6b9c713cf8d9ef79511f2775e4fcaeb4b94fc224e461efa1fa416058780923
-
Filesize
10KB
MD5ee8e18fefdcdf8224351d1c53df11bea
SHA191fa815f029aa572370db2453be03e7e90434091
SHA2566524beadc1fc66144a9ef851e6198038aafb2d13b1530fe77360bc92d6547a1d
SHA512e03079bfde49d668b6d05de274a1df2e0d9c12a10cf968167d50e635c607c1894ea1691425c2d7b624dde971d8467fded55eff736f54cbdeb0667c5edb307f1f