Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 16:50
Behavioral task
behavioral1
Sample
e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe
-
Size
99KB
-
MD5
e261ac9b29b83c9feefad1fb52ed5fb8
-
SHA1
16dcacc5a482b997b88bac418c72b861bbf8eee3
-
SHA256
dc7216f4a9cd27ecda481ecb9e06d713bdf97104e1e3fcc25f470fee590aa972
-
SHA512
b9b272552dcaab23a117665646c84a9619e9d60fe08c36bdb9b2185104ca89c39f6fbbc5897ad190f781774ae1ef9323a45ca1ad83b800e7e8b79629aa5b61b3
-
SSDEEP
1536:Roaj1hJL1S9t0MIeboal8bCKxo7h0RPSaml0Nz30rtrd8p:i0hpgz6xGhpamyF30B58p
Malware Config
Signatures
-
Sakula family
-
Sakula payload 5 IoCs
resource yara_rule behavioral1/memory/1804-1-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula behavioral1/files/0x0008000000016399-8.dat family_sakula behavioral1/memory/2284-11-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula behavioral1/memory/2284-13-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula behavioral1/memory/1804-14-0x0000000000400000-0x000000000041B000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2284 MediaCenter.exe -
Loads dropped DLL 2 IoCs
pid Process 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2632 PING.EXE 2768 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2632 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2284 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2284 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2284 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2284 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2768 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2768 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2768 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe 33 PID 1804 wrote to memory of 2768 1804 e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe 33 PID 2768 wrote to memory of 2632 2768 cmd.exe 35 PID 2768 wrote to memory of 2632 2768 cmd.exe 35 PID 2768 wrote to memory of 2632 2768 cmd.exe 35 PID 2768 wrote to memory of 2632 2768 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\e261ac9b29b83c9feefad1fb52ed5fb8_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5e019c11ba38aa1bd2f8c389f574b0b7a
SHA13b95c5f7efe787c8ef98267b60f46518304a8609
SHA256a23ba5f709b457385c894471c3a62cc4cd66d002113ee4b6d679d850183f2b0e
SHA512f4d7cebb54593260a51fdafd6ac15ff979d6f0bc3bd498bb9c1a3cdf9405058085e4e834086a36806513ec380cf28d0082e34fa381ca6180ce71a71a57aff7fa