Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe
-
Size
496KB
-
MD5
8aefd589efeb7ceb795ca6cc58f9bf20
-
SHA1
35bb5e50341d3a72e82e996388c89bbaa9d2efbb
-
SHA256
2e3a7739fd9eb2e6bb2f7747918a025e1bbcd3f8c9fd952d0e4a879992084c9c
-
SHA512
d33a443f385345c1659b1e2a2080a9eaf8140117641a03cda7b0ec63ef004ea995fca0fc44b45768ead44ca080f31435aec29a9978c562e061e6ac9d1f03eee0
-
SSDEEP
12288:FmkbnVZIeNyo1BoGJHKnJFgaXdqu3U8OEtOM2ZNtTird:YqbIeNyos4KnJF1XM8OEtOnTEd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4640 4.exe 1528 Hacker.com.cn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 4.exe File opened for modification C:\Windows\Hacker.com.cn.exe 4.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hacker.com.cn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4640 4.exe Token: SeDebugPrivilege 1528 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1528 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3932 wrote to memory of 4640 3932 JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe 88 PID 3932 wrote to memory of 4640 3932 JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe 88 PID 3932 wrote to memory of 4640 3932 JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe 88 PID 1300 wrote to memory of 1624 1300 cmd.exe 89 PID 1300 wrote to memory of 1624 1300 cmd.exe 89 PID 1528 wrote to memory of 4772 1528 Hacker.com.cn.exe 94 PID 1528 wrote to memory of 4772 1528 Hacker.com.cn.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:1624
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
785KB
MD51f4759ec8dc50429ce7127aa292100ae
SHA1c6583bf92638defbbd915689e5c5782014b0cf7f
SHA2562da9359008415a0543c02c744b2dadaeb98f5b356755c0bda9e86317df1e40cc
SHA5123bfcae9241244b655cee125707cbfe13388d4b86bdcc747303b5048d2a19a8f058c3d1192524133048f988553d6c5ae3294f49361f12a535a1b05ecd891298fb