Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 14:21
Behavioral task
behavioral1
Sample
746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe
-
Size
459KB
-
MD5
746bef01056a1e390de4dd05730df6a8
-
SHA1
810da31e3cc8a0e801031e832a7ce41f80353a60
-
SHA256
18f34e8fc05478f8d3eab56c4597b4c48f99b6ebcb74e3aed81febb3e9320329
-
SHA512
9614f5d2a66599ed6c9a4f8ef3d4d2b616a826ad98ffdbece972630abb506ffdf1877bdd0150fec8f2a4dc9cae9f39f73d509024cfe7437be8200ddd017cdc0a
-
SSDEEP
6144:U+7CcSJzOGT/2oHnsUTMyXxavz4+aG1Wj8FcNMcFxXz7Rj75SodSA95rZEu/VA8d:hCjmzcFh3SzA95Nx/SnMuvMcNo2q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 Adufea.exe -
resource yara_rule behavioral1/memory/2144-0-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/files/0x0008000000018d89-12.dat upx behavioral1/memory/1748-16-0x0000000000400000-0x0000000000474000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\WHMDNR9LKK = "C:\\Windows\\Adufea.exe" Adufea.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe File created C:\Windows\Adufea.exe 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe File opened for modification C:\Windows\Adufea.exe 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adufea.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main Adufea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe 1748 Adufea.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2144 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe 1748 Adufea.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2144 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe 1748 Adufea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1748 2144 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe 30 PID 2144 wrote to memory of 1748 2144 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe 30 PID 2144 wrote to memory of 1748 2144 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe 30 PID 2144 wrote to memory of 1748 2144 746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\Adufea.exeC:\Windows\Adufea.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459KB
MD5746bef01056a1e390de4dd05730df6a8
SHA1810da31e3cc8a0e801031e832a7ce41f80353a60
SHA25618f34e8fc05478f8d3eab56c4597b4c48f99b6ebcb74e3aed81febb3e9320329
SHA5129614f5d2a66599ed6c9a4f8ef3d4d2b616a826ad98ffdbece972630abb506ffdf1877bdd0150fec8f2a4dc9cae9f39f73d509024cfe7437be8200ddd017cdc0a
-
Filesize
372B
MD596eb9c7c64fcda0ed7342728d2e90d91
SHA13b0d16a933f9ba01bc101db3e726d0da6795d164
SHA2564a7985b7e758ea48bf2f68e19e8e590e334e6f293ec1fab938c39a654ae3c9d6
SHA51206f44c908cca675337c8f90299bd0bb2b910a66fcbfe2072775e11e1d18e108cad843583354c2bccbbae5b1ae408e37c883c9b523fdbfacc3b54e82bbcc6c1d3