Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 20:52
Static task
static1
Behavioral task
behavioral1
Sample
71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe
-
Size
504KB
-
MD5
71305fdac571a8bfad9c85ac5dc433fb
-
SHA1
51f90fa98b295184b982341f0742c24307e24d0c
-
SHA256
e6d32f9a05859a88d12e3aaaf94ea3f405e13a83328c68a98f6510fd7439dbeb
-
SHA512
8186aef59b28a606e3af868323f5252e8b636cbe0baa076a9d5f5709e57b552e71738cd90c5b75ab9d48d1af3c72408c814ab27c4abbbe3be3da13f7e97cc15e
-
SSDEEP
12288:73RHehaYT2zrzQ1OuKlyToIIodS1BbPyuAmUGSk:7V2al/zQOZpKgFAmUw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,riodrv.exe" 71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 riodrv.exe -
Loads dropped DLL 2 IoCs
pid Process 2080 71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe 2080 71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\riodrv.exe 71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\riodrv.exe 71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language riodrv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2724 2080 71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2724 2080 71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2724 2080 71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2724 2080 71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\71305fdac571a8bfad9c85ac5dc433fb_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\riodrv.exeC:\Windows\system32\riodrv.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD53fac2feb497dcabddfb8b901b2574584
SHA168c3db05a780a4854608671c6dc49e2d219f8176
SHA25662981094f70796165b158ea944eb26a153b61d6c7e14010eb74c8fb771c042a5
SHA512a0d38a0eba24282be55f00dc096532c4a5d3a4471cc1a5193b86f94e17810976d0e99c1b8a5b701fbdd305c29167c4bdc6782cf7f54dc3a16004499e69cf42ea