Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 15:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe
-
Size
88KB
-
MD5
248e7834494f4e1e0d5ed161b08326d0
-
SHA1
10f95e0ea941a4c6dca4b6e58a5e148389aadce7
-
SHA256
99736ff1b3525552c3849b3b9282f98fdf66ecbcac424c9cc74bd6068e684a23
-
SHA512
8bbd448181550659694f535acbd7d38643013c6549d0bcdce6fc3d174dfc57e871560ccd79561e9dd4fac40c9ea72f5b87fa0d914b6cc68fc624068e75d39eb2
-
SSDEEP
1536:f5nfmIpxDWbUfd3aOPmxxEhvgCooXqRQqjh+rmKVsN:f5fvp12UFKcD/6jwqWsN
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\2249CCED = "C:\\Users\\Admin\\AppData\\Roaming\\2249CCED\\bin.exe" winver.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe 2632 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2632 winver.exe 1100 Explorer.EXE 1100 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1100 Explorer.EXE 1100 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2632 2968 JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe 29 PID 2968 wrote to memory of 2632 2968 JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe 29 PID 2968 wrote to memory of 2632 2968 JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe 29 PID 2968 wrote to memory of 2632 2968 JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe 29 PID 2968 wrote to memory of 2632 2968 JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe 29 PID 2632 wrote to memory of 1100 2632 winver.exe 20 PID 2632 wrote to memory of 1028 2632 winver.exe 17 PID 2632 wrote to memory of 1044 2632 winver.exe 18 PID 2632 wrote to memory of 1100 2632 winver.exe 20 PID 2632 wrote to memory of 1324 2632 winver.exe 23
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1028
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1044
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_248e7834494f4e1e0d5ed161b08326d0.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2632
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1324