Analysis
-
max time kernel
125s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe
-
Size
13KB
-
MD5
01fcd747f2cc01930fb8807f7d899f79
-
SHA1
7a0dc17da1d36f8a41c12dd662c26d55d65f34d0
-
SHA256
31e6fffa75b235b665fc3b6a108aeb79c1af3b231c3c7675269cc5723d708234
-
SHA512
3919c0ff6c8889aa563b60a2b1fdc13c16174b06b39359e9b95634c21463a28650182970e28e677e85ce1cc84d08ea16e53883d7e456dc9306ab6080a6ab122a
-
SSDEEP
192:Pvuvm3xrtP/klYOGKsXxW03zd5GTAv6c2p4F7FhOjS1RgTOemom4L:P2vmLkld03GcKm7FT6OemomO
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 2836 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 2904 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 2984 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 2692 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 1112 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 1504 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 1688 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 2708 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 2840 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe -
Loads dropped DLL 8 IoCs
pid Process 1724 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 1724 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 2904 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 2904 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 2692 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 2692 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 1504 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 1504 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe File created C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe File created C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe File created C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe File created C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe File created C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe File created C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe File created C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe File created C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe File created C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2904 1724 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2904 1724 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2904 1724 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2904 1724 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 30 PID 2904 wrote to memory of 2692 2904 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 32 PID 2904 wrote to memory of 2692 2904 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 32 PID 2904 wrote to memory of 2692 2904 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 32 PID 2904 wrote to memory of 2692 2904 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 32 PID 2692 wrote to memory of 1504 2692 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 34 PID 2692 wrote to memory of 1504 2692 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 34 PID 2692 wrote to memory of 1504 2692 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 34 PID 2692 wrote to memory of 1504 2692 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 34 PID 1504 wrote to memory of 2708 1504 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 36 PID 1504 wrote to memory of 2708 1504 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 36 PID 1504 wrote to memory of 2708 1504 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 36 PID 1504 wrote to memory of 2708 1504 01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe"C:\Windows\system32\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe"C:\Windows\system32\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe"C:\Windows\system32\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe"C:\Windows\system32\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2708
-
-
-
-
-
C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exeC:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2836
-
C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exeC:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2984
-
C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exeC:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1112
-
C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exeC:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1688
-
C:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exeC:\Windows\SysWOW64\01fcd747f2cc01930fb8807f7d899f79_JaffaCakes118.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD501fcd747f2cc01930fb8807f7d899f79
SHA17a0dc17da1d36f8a41c12dd662c26d55d65f34d0
SHA25631e6fffa75b235b665fc3b6a108aeb79c1af3b231c3c7675269cc5723d708234
SHA5123919c0ff6c8889aa563b60a2b1fdc13c16174b06b39359e9b95634c21463a28650182970e28e677e85ce1cc84d08ea16e53883d7e456dc9306ab6080a6ab122a