Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 15:25
Behavioral task
behavioral1
Sample
JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe
-
Size
11KB
-
MD5
8acd44e199b7fd7396be915c1adbd4a8
-
SHA1
f7ce66a2a7b6939af7d06bda9dafcb8e2b34d465
-
SHA256
82bcc90ad573b8292f26c5b2c55564d6bf3ddbee8fc4d6b15adc7e25b796defd
-
SHA512
0b6a91eb48d1aff76abaf89169e47a9cc4929c8fac20dd418b93163e63b06e8afe7d3ed86683e11a529b2b8c078ca0d266cf3126fba8cba97af5fa61718f5f3f
-
SSDEEP
192:8VAItwRngwLGgU42ljj0l63XF3e+5mUbxx2hJ+L0f+:8qh9bLRKjj0Q3XFd5rFwf+
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 4032 services.exe 4892 services.exe 2420 services.exe 4952 services.exe 3268 services.exe 2136 services.exe 4964 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xp_system = "C:\\Windows\\inet20088\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xp_system = "C:\\Windows\\inet20088\\services.exe" services.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5321E378-FFAD-4999-8C62-03CA8155F0B3} services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5321E378-FFAD-4999-8C62-03CA8155F0B3}\ services.exe -
resource yara_rule behavioral2/memory/3812-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x001200000001e69a-3.dat upx behavioral2/memory/4032-5-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2420-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2420-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4892-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3812-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4032-15-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3268-30-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4952-29-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2136-39-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4964-43-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inet20088\services.exe JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe File opened for modification C:\Windows\inet20088\services.exe JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe File opened for modification C:\Windows\system.ini services.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Internet Explorer\Main services.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" services.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3812 wrote to memory of 4032 3812 JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe 98 PID 3812 wrote to memory of 4032 3812 JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe 98 PID 3812 wrote to memory of 4032 3812 JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe 98 PID 4676 wrote to memory of 4892 4676 cmd.exe 103 PID 4676 wrote to memory of 4892 4676 cmd.exe 103 PID 4676 wrote to memory of 4892 4676 cmd.exe 103 PID 428 wrote to memory of 2420 428 cmd.exe 104 PID 428 wrote to memory of 2420 428 cmd.exe 104 PID 428 wrote to memory of 2420 428 cmd.exe 104 PID 3672 wrote to memory of 4952 3672 cmd.exe 121 PID 3672 wrote to memory of 4952 3672 cmd.exe 121 PID 3672 wrote to memory of 4952 3672 cmd.exe 121 PID 4676 wrote to memory of 3268 4676 cmd.exe 122 PID 4676 wrote to memory of 3268 4676 cmd.exe 122 PID 4676 wrote to memory of 3268 4676 cmd.exe 122 PID 856 wrote to memory of 2136 856 cmd.exe 128 PID 856 wrote to memory of 2136 856 cmd.exe 128 PID 856 wrote to memory of 2136 856 cmd.exe 128 PID 4320 wrote to memory of 4964 4320 cmd.exe 129 PID 4320 wrote to memory of 4964 4320 cmd.exe 129 PID 4320 wrote to memory of 4964 4320 cmd.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8acd44e199b7fd7396be915c1adbd4a8.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\inet20088\services.exeC:\Windows\inet20088\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:4032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\inet20088\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\inet20088\services.exeC:\Windows\inet20088\services.exe2⤵
- Executes dropped EXE
PID:4892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\inet20088\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\inet20088\services.exeC:\Windows\inet20088\services.exe2⤵
- Executes dropped EXE
PID:2420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\inet20088\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\inet20088\services.exeC:\Windows\inet20088\services.exe2⤵
- Executes dropped EXE
PID:4952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\inet20088\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\inet20088\services.exeC:\Windows\inet20088\services.exe2⤵
- Executes dropped EXE
PID:3268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\inet20088\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\inet20088\services.exeC:\Windows\inet20088\services.exe2⤵
- Executes dropped EXE
PID:2136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\inet20088\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\inet20088\services.exeC:\Windows\inet20088\services.exe2⤵
- Executes dropped EXE
PID:4964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD58acd44e199b7fd7396be915c1adbd4a8
SHA1f7ce66a2a7b6939af7d06bda9dafcb8e2b34d465
SHA25682bcc90ad573b8292f26c5b2c55564d6bf3ddbee8fc4d6b15adc7e25b796defd
SHA5120b6a91eb48d1aff76abaf89169e47a9cc4929c8fac20dd418b93163e63b06e8afe7d3ed86683e11a529b2b8c078ca0d266cf3126fba8cba97af5fa61718f5f3f