Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 14:06
Behavioral task
behavioral1
Sample
6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe
-
Size
492KB
-
MD5
6fe4ac17766e2878f6b57320cfafcbe4
-
SHA1
20f4ebae589f61726d5ad7ed29c87f222b3f4298
-
SHA256
6ec7b2b08274592b5830ae39c0e6cae025367d455a7ee5407daea259f89b374f
-
SHA512
17219231eb829d970b8bb6088fcf64e44460b3aa294cd6cfc5819672d45df41e399bd2e8f758ef5ab79f26a5235a2f00bff78d88ccfa2d450cd8aafb0ca6f9ba
-
SSDEEP
6144:awcaAn70pz2YDY/XgvZX4NeCPwcaAn70pz2YJY/XgvZX4NeCIZvLKvu:aZn70l3SI4NhPZn70l3UI4NhIJLKvu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 original.exe -
Loads dropped DLL 3 IoCs
pid Process 2008 WerFault.exe 2008 WerFault.exe 2008 WerFault.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\1.exe original.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2008 2028 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language original.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2028 2292 6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2028 2292 6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2028 2292 6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2028 2292 6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2008 2028 original.exe 29 PID 2028 wrote to memory of 2008 2028 original.exe 29 PID 2028 wrote to memory of 2008 2028 original.exe 29 PID 2028 wrote to memory of 2008 2028 original.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6fe4ac17766e2878f6b57320cfafcbe4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\original.exe"C:\Users\Admin\AppData\Local\Temp\original.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 1563⤵
- Loads dropped DLL
- Program crash
PID:2008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD5940d08d63a521c34993b809b52c4596a
SHA1ee37869129ea4d5b63ebe0a3c8bedc201489961c
SHA25621c135e31a3e3b649d991c9e3e17f56fab8e27f2c03756048cbd747c72e996f2
SHA512f10a1df05fbb268efc17509dd83fc4ad0c7ab407b18bffef169a8e64abf481223676d07dd0d9371e22c3bb1c5b074acabb0c338a0e41ae85a542d12c33d2bf50