Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe
-
Size
292KB
-
MD5
523f04e11cd625c15e72b2261dc240b8
-
SHA1
2bb18ca007793a8a3c5f051f09eb450c156e3a82
-
SHA256
af676fdc5414af52a261661e2c9fda1779c0c8f47cb4fdd8094cb09abac8bef6
-
SHA512
e157d01abd292fdb9bba781fb4e666f1e386a46431678fdd474884c9965070052755c8595edf513eb30e4ea6c156a5db96a8649b3b75ea9ba077855b52f2d8db
-
SSDEEP
6144:HlmiYtJM2IjYznwNdZZ5fwVLWurtfG3aYlkWAoKs7XcQ9FMIti9O:HeLZzn6ZHfurt2lkZoKs7XcQXTd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2448 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1168 winsense.exe 2700 winsense.exe -
Loads dropped DLL 3 IoCs
pid Process 1252 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 1252 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 1168 winsense.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Sensory = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winsense.exe" winsense.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1168 set thread context of 2700 1168 winsense.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsense.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2448 cmd.exe 2800 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2800 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1168 winsense.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1168 1252 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 30 PID 1252 wrote to memory of 1168 1252 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 30 PID 1252 wrote to memory of 1168 1252 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 30 PID 1252 wrote to memory of 1168 1252 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 30 PID 1252 wrote to memory of 2448 1252 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 31 PID 1252 wrote to memory of 2448 1252 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 31 PID 1252 wrote to memory of 2448 1252 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 31 PID 1252 wrote to memory of 2448 1252 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 31 PID 1168 wrote to memory of 2700 1168 winsense.exe 32 PID 1168 wrote to memory of 2700 1168 winsense.exe 32 PID 1168 wrote to memory of 2700 1168 winsense.exe 32 PID 1168 wrote to memory of 2700 1168 winsense.exe 32 PID 1168 wrote to memory of 2700 1168 winsense.exe 32 PID 2448 wrote to memory of 2800 2448 cmd.exe 34 PID 2448 wrote to memory of 2800 2448 cmd.exe 34 PID 2448 wrote to memory of 2800 2448 cmd.exe 34 PID 2448 wrote to memory of 2800 2448 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\winsense.exe"C:\Users\Admin\AppData\Local\Temp\winsense.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\winsense.exeC:\Users\Admin\AppData\Local\Temp\winsense.exe3⤵
- Executes dropped EXE
PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD576f662464f938a4c4925a29b2ad1a40e
SHA120a44612b173e7c227a1f85b45ce87c7fda32d03
SHA2560aa726ef8fde509f06a9a8f67b0db443eb9d8b83113834e969eb8a3b5502bb17
SHA512f5688b9148f3b0fed4bf9f527c2ef62cfe387e5ec6b68087ffa31c5ab7d1c7b15f2288bdea47a2be445ef86b277c56d37ae985c360485ef1a55b14f31d0dbcf9