Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 06:12
Behavioral task
behavioral1
Sample
6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe
-
Size
50KB
-
MD5
6a8778a889fbcd316ae97f3032614f56
-
SHA1
9cbfdeb22f98be677494b249e742549eb3f0e0dd
-
SHA256
68b6de338ee34786412275e338625fa651188fa7fcafcdf797520495c14b40dd
-
SHA512
62d8ad7200d8ede8387374289fe35b57da2aab18496f65ea2dc3b6e1bb2658cc49813fd5982660c899d89924714dbe9fa058a619b6a3e1546948cf9727409990
-
SSDEEP
768:DGIVVIpY/WYml4WKZ0D9Z1BJaZe6/JgpYBCP:iIjo1ra58
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 560 cmd.exe -
resource yara_rule behavioral1/memory/3048-1-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/3048-15-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3048 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe 3048 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe 3048 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 560 3048 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe 29 PID 3048 wrote to memory of 560 3048 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe 29 PID 3048 wrote to memory of 560 3048 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe 29 PID 3048 wrote to memory of 560 3048 6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a8778a889fbcd316ae97f3032614f56_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c c:\del.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236B
MD5bcebe4771ad08c5d9d8fd3bc873aa534
SHA1452ab078880137c8c4907f3e68af2534990544db
SHA256791a25c623c202344ac31c3559eb50d158744b9f8788017493f915dd378080d0
SHA512efc2c7c8440626ea48093e669cc0e237968fb1caef4914624d23d37b8a16a0eace89a4ff2cc6ce3b9f55239743da6b960bbcadbc99e08eed344ed9e3d16c8e8d