Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe
-
Size
36KB
-
MD5
75b094a821943d047cad043a3f0b27e7
-
SHA1
15f25be6f85e754ea76405344b97bfa26ecbc699
-
SHA256
79bfd2bbf93caba1ce89ef66b7505d7e24782afd5b4dd571fb9b6fdbee3b0e24
-
SHA512
7f9fa2ba9aa63d35a912e7b431e235226b63ba28eddaf5df4392841177718337cf70ea8a45c44e6ae001b754248818c158526219f985ebb4e530c80820aa8636
-
SSDEEP
768:+hA+1fvddWwNqP4sULADFDvjbmjyWVz9INfAWKs65P9vuWyS6pZ/blOGqFbY:813Z02Gj1WVz9gfAi65P9v5Olmm
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WINGB_EN.ime 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WINGB_EN.ime 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe File created C:\Windows\SysWOW64\MSINET.log 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2936 2680 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies Control Panel 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\Input Method 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\Input Method\Parallel Distance = 00000000 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\Input Method\Perpendicular Distance = 10000000 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\Input Method\Parallel Tolerance = 20000000 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\Input Method\Perpendicular Tolerance = 10000000 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2744 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2744 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2744 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2744 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2936 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe 32 PID 2680 wrote to memory of 2936 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe 32 PID 2680 wrote to memory of 2936 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe 32 PID 2680 wrote to memory of 2936 2680 75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c tr.bat2⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 1642⤵
- Program crash
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD553e841ab3ab431a3a1a36e147d264233
SHA1f39dd93436c0e3b0968e5325f21d575224df0e25
SHA256d55b29a6ee56f00c37f29671785ad51f074deb760eb0f51e612ed2b03865019e
SHA512a4a895e5d0a26533566be7469e5a2e894ddbfe518636639e5df3435ddbce6dcc326d9d7a9c8c58d5a671dac4c4276ef348892a8fa7b7730585b66da3ccdf7966
-
Filesize
154B
MD52b69ec34a7b68a5b34ffc924adf0b556
SHA1c5683c66731b217fc0b7d65c7a144bebb534ae67
SHA2569305742c82ebb8abea779147bc62552f3a0473a6e7bb2b41722e05b5633aed2c
SHA512fd515767f9959ecdad264c7bf89def06cb8e471a38f7b7b18e908081c962864575fb1d722c2a22047c0c28069407f5126041a7e7e8b4e1b5be2bbb76efd9a19c