Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 13:19
Behavioral task
behavioral1
Sample
6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe
-
Size
212KB
-
MD5
6fbc1e912096e8ba36e28f2826d928d9
-
SHA1
255c6890eb15a39a7fefe495c473f8aa7ac22366
-
SHA256
8bed0e77a36c4e4aa5451d95e5f897ec2d446b278ad8b48f202e4a9c2d4aba40
-
SHA512
f6813c0f86de8086ab116d835a760b04ffcbe578f393a67f0b8932cec0b7f86d420fe82c36edbe7dde905b375365902f0ac22027ce6b90d175603983952c0454
-
SSDEEP
6144:U64VvSOAAAJiJQWwaEY+p55bV0f6RuI+7SqtoOPmEf/J0:U6AkAAcQWnEYEnbeXI+7SL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2508 Rgusia.exe -
resource yara_rule behavioral1/memory/2452-1-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2508-13-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/files/0x0008000000015d78-11.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\HLTCDMS83A = "C:\\Windows\\Rgusia.exe" Rgusia.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe File created C:\Windows\Rgusia.exe 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe File opened for modification C:\Windows\Rgusia.exe 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rgusia.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main Rgusia.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe 2508 Rgusia.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2452 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe 2508 Rgusia.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2452 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe 2508 Rgusia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2508 2452 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2508 2452 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2508 2452 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2508 2452 6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6fbc1e912096e8ba36e28f2826d928d9_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\Rgusia.exeC:\Windows\Rgusia.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD56fbc1e912096e8ba36e28f2826d928d9
SHA1255c6890eb15a39a7fefe495c473f8aa7ac22366
SHA2568bed0e77a36c4e4aa5451d95e5f897ec2d446b278ad8b48f202e4a9c2d4aba40
SHA512f6813c0f86de8086ab116d835a760b04ffcbe578f393a67f0b8932cec0b7f86d420fe82c36edbe7dde905b375365902f0ac22027ce6b90d175603983952c0454
-
Filesize
372B
MD587528a2f45118fc0dea3b68c8242b336
SHA184920ca564d92cbf8fbb4c719d834185622a5c75
SHA2568e7e27ee8ca194ee0b309207cd1dcc7666b7fe9556230922387258801f30deea
SHA512e8d7c575f53d464eaa33fd37d21b94ad366236fc760d8d6a87af51eb887b9c88fc0026a012b5214f60c75b3bce5a5a655d125c21bfba8069dce4a60e34dc8b0a