Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
725a2e3a6f4508faba099b73cace171a
-
SHA1
8742ed151382f82b019140de24981d63148de876
-
SHA256
299a11fa94e13485e81aadcad4bfd330be9f9b6a941a906ed6c6f3048b0ab516
-
SHA512
f50b65531d1636688ba3d5e8d7893cf2f401093041c3bb92decc6b5b9b71b67fca93f2945858a1213f6acb46093adb7592a87a346254957997ad36edf67024dd
-
SSDEEP
49152:OFUcx88PWPOpX0SFziMtY5B27Sy05NRVjveD4hvPSn+BWwhyGc:O+K88uPCHBO+7STP7jvUIHSn+B3hyGc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 8BDB.tmp -
Loads dropped DLL 1 IoCs
pid Process 2544 725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8BDB.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2888 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3032 8BDB.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3032 2544 725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe 30 PID 2544 wrote to memory of 3032 2544 725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe 30 PID 2544 wrote to memory of 3032 2544 725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe 30 PID 2544 wrote to memory of 3032 2544 725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2888 3032 8BDB.tmp 31 PID 3032 wrote to memory of 2888 3032 8BDB.tmp 31 PID 3032 wrote to memory of 2888 3032 8BDB.tmp 31 PID 3032 wrote to memory of 2888 3032 8BDB.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\8BDB.tmp"C:\Users\Admin\AppData\Local\Temp\8BDB.tmp" --splashC:\Users\Admin\AppData\Local\Temp\725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe 9F5553BB5C4D694D1AFE984D8DD746F1E1554602E80B08E0424EC0B67493D0FBC92039E01018855D583A18B7991B287C6F1A7E619FF5D687F90194BA6C9127952⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\725a2e3a6f4508faba099b73cace171a_JaffaCakes118.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD54046ff080673cffac6529512b8d3bdbb
SHA1d3cbc39065b7a55e995fa25397da2140bdac80c1
SHA256f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680
SHA512453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418
-
Filesize
2.0MB
MD50fa525c126633c3d6819484e79b577e2
SHA10abdd05abd9b0be7e09e89959e42e4d63d25692b
SHA25616e992481eb889df06b6a3ed20a7c853ae7ed0457a64fb940fbfbc450fa22874
SHA512fdd95e8ebf431aeea20c030395f44ea99e98e756ca0d3e1ea7998c9c5ba5f6bb40842ec03f8764b487d60e605563d534a9517e832f8921a10b462d51c930aade