Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 22:17
Behavioral task
behavioral1
Sample
6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe
-
Size
10KB
-
MD5
6929e0d64b157d321e84f95ef2a8e087
-
SHA1
9545d50c4a180ad30ab83a8e697429469238bd58
-
SHA256
a8db3803e1f827f739e066041740fe9641c0b8ae45d9e1d1a2a2c13cea515bc6
-
SHA512
80b010f60ac40ce0a19e9d5e1dc08558fee0dd6a1719776e9bec6b4bcbf15d70badc9dd3c7f15ce06704ad86ba05a8324c17158b3f81f876bf31c328b2bd9415
-
SSDEEP
192:K4XuJaaKhJAUqeHAZiJW57IdHIGQwTDgyZDNf0qiRNbu7+:hS09gZiWllIDxuVy+
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 2704 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 comremok.exe -
Loads dropped DLL 2 IoCs
pid Process 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/904-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x00080000000193b7-3.dat upx behavioral1/memory/3068-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/904-21-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\comremo.dll 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe File created C:\Windows\SysWOW64\comremok.exe 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\comremok.exe 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 904 wrote to memory of 3068 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe 30 PID 904 wrote to memory of 3068 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe 30 PID 904 wrote to memory of 3068 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe 30 PID 904 wrote to memory of 3068 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe 30 PID 904 wrote to memory of 2704 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe 31 PID 904 wrote to memory of 2704 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe 31 PID 904 wrote to memory of 2704 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe 31 PID 904 wrote to memory of 2704 904 6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\comremok.exeC:\Windows\system32\comremok.exe ˜‰2⤵
- Executes dropped EXE
PID:3068
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118.exe.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5d55b755d5282a426deb834e97a947673
SHA1adc2712b45cf3736707426464a683689c5c485e6
SHA256f291fb6df0a4b0ea7bcf60619bb1d175ef37ebe849d8585037d88b81ebafbcde
SHA5123a6a307fcada892253154d84a8c95eab9a3d5ca42dc941b3ee1884c894ecc2786eaec7080ed394f336db82d489f7ebbafa24d02767bac70a64c1c5ec12583852
-
Filesize
10KB
MD56929e0d64b157d321e84f95ef2a8e087
SHA19545d50c4a180ad30ab83a8e697429469238bd58
SHA256a8db3803e1f827f739e066041740fe9641c0b8ae45d9e1d1a2a2c13cea515bc6
SHA51280b010f60ac40ce0a19e9d5e1dc08558fee0dd6a1719776e9bec6b4bcbf15d70badc9dd3c7f15ce06704ad86ba05a8324c17158b3f81f876bf31c328b2bd9415