Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 14:30
Behavioral task
behavioral1
Sample
JaffaCakes118_684b6209b8ca11659ee38adb779c04e7.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
General
-
Target
JaffaCakes118_684b6209b8ca11659ee38adb779c04e7.exe
-
Size
160KB
-
MD5
684b6209b8ca11659ee38adb779c04e7
-
SHA1
f2e025b16a3aa839967563f57aac8c8678551cb7
-
SHA256
685f9989c1e6e50d48238c4cd0c6dfafdf9a7ecbdb64ba9359bca6a240e4eb53
-
SHA512
e97224e65226fe58929137d014aecf631f54ef148106a96eb21cd55fce61ca73710d7d6f4e8ce3d4af682737ec7cc48a608f8812d6f83757bbcd3e6d8bb65767
-
SSDEEP
1536:PEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:8Y+4MiIkLZJNAQ9J6v
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\EE7EA64F = "C:\\Users\\Admin\\AppData\\Roaming\\EE7EA64F\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/3036-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_684b6209b8ca11659ee38adb779c04e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe 2348 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2348 3036 JaffaCakes118_684b6209b8ca11659ee38adb779c04e7.exe 31 PID 3036 wrote to memory of 2348 3036 JaffaCakes118_684b6209b8ca11659ee38adb779c04e7.exe 31 PID 3036 wrote to memory of 2348 3036 JaffaCakes118_684b6209b8ca11659ee38adb779c04e7.exe 31 PID 3036 wrote to memory of 2348 3036 JaffaCakes118_684b6209b8ca11659ee38adb779c04e7.exe 31 PID 3036 wrote to memory of 2348 3036 JaffaCakes118_684b6209b8ca11659ee38adb779c04e7.exe 31 PID 2348 wrote to memory of 1208 2348 winver.exe 21 PID 2348 wrote to memory of 1108 2348 winver.exe 19 PID 2348 wrote to memory of 1152 2348 winver.exe 20 PID 2348 wrote to memory of 1208 2348 winver.exe 21 PID 2348 wrote to memory of 1648 2348 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_684b6209b8ca11659ee38adb779c04e7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_684b6209b8ca11659ee38adb779c04e7.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2348
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1648