Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2025, 19:38
Behavioral task
behavioral1
Sample
JaffaCakes118_b9de1a7e33838739765280f88cd4d085.exe
Resource
win7-20241010-en
8 signatures
150 seconds
General
-
Target
JaffaCakes118_b9de1a7e33838739765280f88cd4d085.exe
-
Size
46KB
-
MD5
b9de1a7e33838739765280f88cd4d085
-
SHA1
b33cae4f136d285e586be2e06f08fcedb503ead4
-
SHA256
f87c76ce50c25cbd35a4ba2309ac20508300b2aa7e8432b1f6c5ed414409c45b
-
SHA512
21ff6386d6e4258b29e84d4fd7d817a7573fcf100268aa8f0dac82059c79ca52093e5cacb68cb0201632a45e3632022b212b52ecd332fad140273a6555c0808c
-
SSDEEP
768:HtwyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:Htwyedxwr1qUMv4VV6j2A83hVY
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\354A5417 = "C:\\Users\\Admin\\AppData\\Roaming\\354A5417\\bin.exe" winver.exe -
resource yara_rule behavioral2/memory/816-0-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3448 1120 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b9de1a7e33838739765280f88cd4d085.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1120 winver.exe 1120 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1120 winver.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 816 wrote to memory of 1120 816 JaffaCakes118_b9de1a7e33838739765280f88cd4d085.exe 84 PID 816 wrote to memory of 1120 816 JaffaCakes118_b9de1a7e33838739765280f88cd4d085.exe 84 PID 816 wrote to memory of 1120 816 JaffaCakes118_b9de1a7e33838739765280f88cd4d085.exe 84 PID 816 wrote to memory of 1120 816 JaffaCakes118_b9de1a7e33838739765280f88cd4d085.exe 84 PID 1120 wrote to memory of 3464 1120 winver.exe 56 PID 1120 wrote to memory of 2944 1120 winver.exe 49 PID 1120 wrote to memory of 2992 1120 winver.exe 50
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2992
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b9de1a7e33838739765280f88cd4d085.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b9de1a7e33838739765280f88cd4d085.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 3564⤵
- Program crash
PID:3448
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1120 -ip 11201⤵PID:3872