Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 16:23
Behavioral task
behavioral1
Sample
JaffaCakes118_e8ba29eed7f3314d0aa91bb9a112aa93.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
General
-
Target
JaffaCakes118_e8ba29eed7f3314d0aa91bb9a112aa93.exe
-
Size
36KB
-
MD5
e8ba29eed7f3314d0aa91bb9a112aa93
-
SHA1
3a2fe759163491954117ce29f282c2fc013a5d81
-
SHA256
83e22e8780eea945eaca041a1ad45e5dc83a286d9366dc9c4b15bf68a9c4a758
-
SHA512
bb3eacb6548795c241ab437eba5a1d25a969e1a8cbcfd8b6cf7bd975f78cfdaaaf3bac9b42e6c234764c6006b9e183731f160be8d1c8f8b698cc836953cbcf1e
-
SSDEEP
768:3p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J:3pYoX58z1uirL98xMWnT0OQ9J
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\7307980A = "C:\\Users\\Admin\\AppData\\Roaming\\7307980A\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2988-0-0x0000000000400000-0x0000000000417000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e8ba29eed7f3314d0aa91bb9a112aa93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe 2184 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2184 2988 JaffaCakes118_e8ba29eed7f3314d0aa91bb9a112aa93.exe 32 PID 2988 wrote to memory of 2184 2988 JaffaCakes118_e8ba29eed7f3314d0aa91bb9a112aa93.exe 32 PID 2988 wrote to memory of 2184 2988 JaffaCakes118_e8ba29eed7f3314d0aa91bb9a112aa93.exe 32 PID 2988 wrote to memory of 2184 2988 JaffaCakes118_e8ba29eed7f3314d0aa91bb9a112aa93.exe 32 PID 2988 wrote to memory of 2184 2988 JaffaCakes118_e8ba29eed7f3314d0aa91bb9a112aa93.exe 32 PID 2184 wrote to memory of 1144 2184 winver.exe 20 PID 2184 wrote to memory of 1072 2184 winver.exe 17 PID 2184 wrote to memory of 1084 2184 winver.exe 18 PID 2184 wrote to memory of 1144 2184 winver.exe 20 PID 2184 wrote to memory of 2040 2184 winver.exe 23
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1072
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1084
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8ba29eed7f3314d0aa91bb9a112aa93.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8ba29eed7f3314d0aa91bb9a112aa93.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2184
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2040