Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe
-
Size
268KB
-
MD5
71eafa1350dcdeaa18d621929574642a
-
SHA1
4a379dc7a31af36cdb2a4b7f6ff7f5c1cac28832
-
SHA256
549df45ddd1528e878098f6c71d78cb96604d9888f7c082c30924ae6982c560c
-
SHA512
5b2a7ea01f2e476a3b2f839827c186aeb8d2ab642fbf8fb5b91defa940b2d15e1fc94a9b826e19520992bd3b8327f4317f2567343564b9b6ce989eb0c752f82f
-
SSDEEP
3072:9gdesn3BUCejNTYUFrsry+2B/lS1sJqJCV1DQLAvWsXz9rW+R1PRJhTA9lXBgp:GdesxNe+/6JqJCAL4WsXz11PDhTAXBg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2872 server.exe -
Loads dropped DLL 4 IoCs
pid Process 2348 71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe 2348 71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe 2348 71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe 2348 71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2872 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 DllHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2872 2348 71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2872 2348 71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2872 2348 71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2872 2348 71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe 30 PID 2872 wrote to memory of 1324 2872 server.exe 21 PID 2872 wrote to memory of 1324 2872 server.exe 21 PID 2872 wrote to memory of 1324 2872 server.exe 21 PID 2872 wrote to memory of 1324 2872 server.exe 21 PID 2872 wrote to memory of 1324 2872 server.exe 21 PID 2872 wrote to memory of 1324 2872 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\71eafa1350dcdeaa18d621929574642a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\Desktop\server.exe"C:\Users\Admin\Desktop\server.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD500c7cdf40e3bf63e0a6c236f117acff2
SHA1f0ea5cca86f01b2adaa4e269ffcdc770c4e90d4a
SHA2563f5a8910c70b63daaae292daec95dd14b0bf234c26acbf67a4d5a013dc15b06e
SHA5121cc32f47ab737c4f57eaf313493f6e6cb84ecb1308865f5ad6df3df9b5b3d2d5d238291a2fc737a286fb3362aff404bb0e6a784e968682e3df4028778eddeafb
-
Filesize
62KB
MD51079039963bf0f6e919caf541a5ca15d
SHA10f8c2d47bac92251519b2b1a06b3168b85224f8b
SHA25682ae5cd45338d49932ebae4e7b4f9e1dd87c06797d382ac2c2570dfbdb99c7fc
SHA5126850c5f0c14a8c5cd48ca827734b7c15e76fdc317bf4934f28a50e15d7552b3e7902efd429f49edd7fbcff8ccfe01e3f67ce20ad9d507868d3527f5c83a86233