Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06/01/2025, 11:46
Behavioral task
behavioral1
Sample
JaffaCakes118_21c98d8341a117ae697617f560fd6a78.exe
Resource
win7-20241010-en
8 signatures
150 seconds
General
-
Target
JaffaCakes118_21c98d8341a117ae697617f560fd6a78.exe
-
Size
89KB
-
MD5
21c98d8341a117ae697617f560fd6a78
-
SHA1
ad35b3ea165357af93deb30d17f1557afdf9ef35
-
SHA256
a9b9f50e71d6630dbcd4b72812405c2c10f740b697a74192ffd1849f53ba3cda
-
SHA512
df83f46801c2daf0a5b299d4b71bf44459a4ce1f9873a84f3a465a8cfae19c2d31f12755be45cd24f0e94173189e92a254fe7639c7d36506f3844f67edf4de26
-
SSDEEP
1536:Tr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:n+4MJIkLZJNAQ9Jo9e
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\923747D4 = "C:\\Users\\Admin\\AppData\\Roaming\\923747D4\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/1684-0-0x0000000000400000-0x0000000000418000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_21c98d8341a117ae697617f560fd6a78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe 2260 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2260 1684 JaffaCakes118_21c98d8341a117ae697617f560fd6a78.exe 31 PID 1684 wrote to memory of 2260 1684 JaffaCakes118_21c98d8341a117ae697617f560fd6a78.exe 31 PID 1684 wrote to memory of 2260 1684 JaffaCakes118_21c98d8341a117ae697617f560fd6a78.exe 31 PID 1684 wrote to memory of 2260 1684 JaffaCakes118_21c98d8341a117ae697617f560fd6a78.exe 31 PID 1684 wrote to memory of 2260 1684 JaffaCakes118_21c98d8341a117ae697617f560fd6a78.exe 31 PID 2260 wrote to memory of 1388 2260 winver.exe 21 PID 2260 wrote to memory of 1252 2260 winver.exe 19 PID 2260 wrote to memory of 1340 2260 winver.exe 20 PID 2260 wrote to memory of 1388 2260 winver.exe 21 PID 2260 wrote to memory of 1508 2260 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1252
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_21c98d8341a117ae697617f560fd6a78.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_21c98d8341a117ae697617f560fd6a78.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2260
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1508