Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe
-
Size
208KB
-
MD5
7356ea2db3e8937ffc9ee843c86cc9de
-
SHA1
7f340181e5797be63608a61c338bb31ab84724cc
-
SHA256
5c7449880a065072298ab9e1cb2bda484e56e4c6fd2348fe122f6a030017315c
-
SHA512
7f574e5214132f3cae1d8474ac19e3d57604b6f47661f364dd5b1e713154f8d39b13f84c5c3fefaf489afbee07a6aec6f4a1865d17fbb50d7c01ecfe6da7bd97
-
SSDEEP
3072:ToBBTxiK9TnPc/6sRH9N44jGvRdt4FC4pLthEjQT6j:TYBTxiKFPc/6yrw4ckEj1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2664 TRNWJG.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\windows\TRNWJG.exe 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe File created C:\windows\TRNWJG.exe.bat 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe File created C:\windows\TRNWJG.exe 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TRNWJG.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2368 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe 2664 TRNWJG.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2368 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe 2368 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe 2664 TRNWJG.exe 2664 TRNWJG.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2824 2368 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2824 2368 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2824 2368 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2824 2368 7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2664 2824 cmd.exe 33 PID 2824 wrote to memory of 2664 2824 cmd.exe 33 PID 2824 wrote to memory of 2664 2824 cmd.exe 33 PID 2824 wrote to memory of 2664 2824 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\TRNWJG.exe.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\windows\TRNWJG.exeC:\windows\TRNWJG.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58B
MD5b96d06aad800d58c8b5c61da0b5f56f5
SHA1a91b8ff67cadf1dcae74884f46481b9c2c585d3a
SHA256d937eb68a01bdbde0d62f2783bbe2585df657fb46a96e5d4c6f40017679c9d7d
SHA5128cd1d9c44b9d630260d73893c2be63ef15ccfff6518c39dee7626fdc2b0f7e74cc023b6773ecea05d9c4caec0350f13b72aab2a351d1d62431ff4bbdab86e556
-
Filesize
208KB
MD5051e26f00b6cbfdf75bc257376b8b2ac
SHA1b0a9d503ef5d0b30698e1c2ef5ea0b67229a38c5
SHA256d7904a1e864cc16a5919791e49fc3fee5d0d3712b83c0f1b582130e482a88871
SHA5126b00aab61c8fa83f2d3fa8205c3c83fa00f7778b15fa97200b224bc9ced27e6d2d8785e6cd88fd8ece2926129e4e78f43d9ae6f84f9fd1ce3c51d90bfee2cadc