Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 12:38
Static task
static1
Behavioral task
behavioral1
Sample
7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe
-
Size
324KB
-
MD5
7416bc0d0349b729d2a9fc7f84f065e2
-
SHA1
6e1a9eac10b6e929ff4e62ae14dd97234c877e33
-
SHA256
e8dea4f907b42d8a9747e6aed4a184899eb7c6346386d924ea444e432152bbb5
-
SHA512
ec65b72039de68f1a896d5f381f9360df7bbdb17c2301d23d698e27c133d05d043e70b5b362f87c503824fcfdce0162e52985a7b6e4a6acf4ad371fd68565517
-
SSDEEP
6144:muCZQOFx4FxvJxL6LbtFFkLRY+PO0PZ+2pJ79:mbKj6Lbtm++20PZ+2r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3428 ctfxmon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3428 set thread context of 4748 3428 ctfxmon.exe 85 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ctfxmon.dll 7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe File created C:\Windows\ctfxmon.exe 7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfxmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3564 wrote to memory of 3428 3564 7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe 84 PID 3564 wrote to memory of 3428 3564 7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe 84 PID 3564 wrote to memory of 3428 3564 7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe 84 PID 3428 wrote to memory of 4748 3428 ctfxmon.exe 85 PID 3428 wrote to memory of 4748 3428 ctfxmon.exe 85 PID 3428 wrote to memory of 4748 3428 ctfxmon.exe 85 PID 3428 wrote to memory of 4748 3428 ctfxmon.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7416bc0d0349b729d2a9fc7f84f065e2_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\ctfxmon.exeC:\Windows\ctfxmon.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:4748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD51bf1d4869730cb2730c807669817f5b3
SHA1c9b33d678a39bae964052ce9b7bf58cb988efd5f
SHA25692d0adef7a659b94ee6ce9ddfe15fad424bcf310fb61c9ddbe73d51889cd9d7d
SHA5124f9b05ed2525c9df7ba22422711708f779ef4d7963cb34a944b83fd806cd2167a7aa853d3cc376969ac807d9e0c5ab0dd259481905cb1acdc11c37fe36e4e28b