Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 14:06
Behavioral task
behavioral1
Sample
6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe
-
Size
492KB
-
MD5
6fe4ac17766e2878f6b57320cfafcbe4
-
SHA1
20f4ebae589f61726d5ad7ed29c87f222b3f4298
-
SHA256
6ec7b2b08274592b5830ae39c0e6cae025367d455a7ee5407daea259f89b374f
-
SHA512
17219231eb829d970b8bb6088fcf64e44460b3aa294cd6cfc5819672d45df41e399bd2e8f758ef5ab79f26a5235a2f00bff78d88ccfa2d450cd8aafb0ca6f9ba
-
SSDEEP
6144:awcaAn70pz2YDY/XgvZX4NeCPwcaAn70pz2YJY/XgvZX4NeCIZvLKvu:aZn70l3SI4NhPZn70l3UI4NhIJLKvu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
original.exepid process 2028 original.exe -
Loads dropped DLL 3 IoCs
Processes:
WerFault.exepid process 2008 WerFault.exe 2008 WerFault.exe 2008 WerFault.exe -
Drops file in Windows directory 1 IoCs
Processes:
original.exedescription ioc process File created C:\Windows\1.exe original.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2008 2028 WerFault.exe original.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
original.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language original.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exeoriginal.exedescription pid process target process PID 2292 wrote to memory of 2028 2292 6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe original.exe PID 2292 wrote to memory of 2028 2292 6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe original.exe PID 2292 wrote to memory of 2028 2292 6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe original.exe PID 2292 wrote to memory of 2028 2292 6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe original.exe PID 2028 wrote to memory of 2008 2028 original.exe WerFault.exe PID 2028 wrote to memory of 2008 2028 original.exe WerFault.exe PID 2028 wrote to memory of 2008 2028 original.exe WerFault.exe PID 2028 wrote to memory of 2008 2028 original.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\original.exe"C:\Users\Admin\AppData\Local\Temp\original.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 1563⤵
- Loads dropped DLL
- Program crash
PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD5940d08d63a521c34993b809b52c4596a
SHA1ee37869129ea4d5b63ebe0a3c8bedc201489961c
SHA25621c135e31a3e3b649d991c9e3e17f56fab8e27f2c03756048cbd747c72e996f2
SHA512f10a1df05fbb268efc17509dd83fc4ad0c7ab407b18bffef169a8e64abf481223676d07dd0d9371e22c3bb1c5b074acabb0c338a0e41ae85a542d12c33d2bf50