Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe
-
Size
177KB
-
MD5
7537a43b8f9cce1e0d3543d6096a2632
-
SHA1
d4c7171257af5a23a4af25029e1b157d1a1ecbee
-
SHA256
8361b0d803cadbec4c2244e9298f30a9ebe611e86df3f1fb6898726c2beefd12
-
SHA512
2f4f5db2dec892ec2507fa641e933726d14ca2b8015b8458d7e5de855dfa7cbe2e956256691063e599bc7fb4af7b595a8d366098c33f7f641d708cd2383ac096
-
SSDEEP
3072:/mTumYf69yfyRkooAVR+JfTLHrtDdzig8zCdQ27tT9rpjVd:sQVdoofP5p6zKQ27tTjJd
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3656-1-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/880-12-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/880-11-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/880-13-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3656-45-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4468-110-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4468-107-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4468-108-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3656-111-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3656-180-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3656 wrote to memory of 880 3656 7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe 84 PID 3656 wrote to memory of 880 3656 7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe 84 PID 3656 wrote to memory of 880 3656 7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe 84 PID 3656 wrote to memory of 4468 3656 7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe 88 PID 3656 wrote to memory of 4468 3656 7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe 88 PID 3656 wrote to memory of 4468 3656 7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:4468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5a63c20ea52b8d8e34581318836a3166e
SHA1cda305d6ef1f6c9713d87ea728efdf82747ab971
SHA25628f23a6d0adf6967ca33844094a18bea2891fb799cee6bcc02ea6045cf33754d
SHA51297e64b9f3af96ee8f584d7749bc3414fe603ae16aef0cd53f17c4d8bbe2973924640b401efbd693bc39c0e6ec0e4b2d8ac61f076555256ddf5c51a376cc6e38c
-
Filesize
600B
MD5921aa032e3c7329edb67d04b6231560d
SHA13951c70b6f835962e327be96ea4d41a0d7e5e469
SHA256efb5a364a1fb259ec278af12717254cd26453539c75bc165e409d9280fa62f56
SHA51254711c187b4c310b170f4d331119034f94e48484203e3787bf8285f2992e024dc2ad395aded2c06286879d156cc51e235aa3954b0a09061adc281ef6cbc2f7a8
-
Filesize
1KB
MD5f382b57da15827b6ee230ce2b6f79cc5
SHA1b3a0708cd16a998812ad061c1a5922769e69ec2e
SHA256ac9ea70a0a32c83da92576e4770d700f9c934eb87da5a6642d7d84e0a138fd8c
SHA512791384c45310185c5f5bf512cb7125640e661e0635badf70daec7ae39c307ec66ff8dd5c2a5290486195782ec91f7b10d44bea131d620fb78c9bdac6325da735