Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 17:55
Behavioral task
behavioral1
Sample
70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe
-
Size
56KB
-
MD5
70a3d309b7ebffcd9cc45a8d3d9b7833
-
SHA1
627aee8c5d59e741530330f2d6c9117413dc4c8a
-
SHA256
972d0a4ef56f532fad3c386fd812a116f6318fd8f6a32269907c9930e446cd5a
-
SHA512
26997374c8ca1729954739cc513d92b954963a069d6ffc559c1ad632e0f134dcad909513e170c763dbfa6e1ea1258c4ef374cbbefe7e28922cae15e70012aff6
-
SSDEEP
1536:8Wiji73hF2Aj7hRwZNSfFn4TxnfG7bZOpm5v:dHF24heZNSNn4TJp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1892 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1892-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x0004000000011ba2-12.dat upx behavioral1/memory/2676-17-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1892-15-0x0000000000170000-0x00000000001AA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1892 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1892 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe 2676 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2676 1892 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe 31 PID 1892 wrote to memory of 2676 1892 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe 31 PID 1892 wrote to memory of 2676 1892 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe 31 PID 1892 wrote to memory of 2676 1892 70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\70a3d309b7ebffcd9cc45a8d3d9b7833_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5c7a49578ffdafd36d185a593737ba716
SHA1b28ac2dd7ac7bc6b35b3c8897cce3b3729b2f763
SHA2564bf912db83842df7ca8d2200a43eaacdc6d4d51d4a587419d9942ae2caa1d39b
SHA5128e1674a5befa9e864bb00bb7f2bff179b045ae3f5e9ceeaa4e725d4f5d2608f83ea640baebb1f66a579b651603a0392b76c7d4460d6e627e42a62757a4d12bb4