Analysis
-
max time kernel
117s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 00:50
Behavioral task
behavioral1
Sample
766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe
-
Size
251KB
-
MD5
766ff58f7654237b7175c847fdd8ff83
-
SHA1
ee99c051d52d15a5f8cd98ca223d40dca3538e09
-
SHA256
4e1c3e1b5570dbbe0854634617be48d8f5b51be003d6f19656fad33f146b638d
-
SHA512
11ff585f82000719009d3e74876db673b871933260989ecda4090475addd5a38fb8413f9bbaf9a22dedd62711a9dae3f4ba846e92b90b8d01f223c601351ded1
-
SSDEEP
6144:VqJpof5u+c+jJlfu63rDEopxMDCFIk3NX:twGjbfuYGmjJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1896 Rqeloa.exe -
resource yara_rule behavioral2/memory/3280-0-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/files/0x000c000000023416-12.dat upx behavioral2/memory/1896-13-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/1896-14-0x0000000000400000-0x0000000000441000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Rqeloa.exe 766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Rqeloa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Rqeloa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe File created C:\Windows\Rqeloa.exe 766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 281068 1896 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rqeloa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Microsoft\Internet Explorer\Main Rqeloa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe 1896 Rqeloa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3280 wrote to memory of 1896 3280 766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe 89 PID 3280 wrote to memory of 1896 3280 766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe 89 PID 3280 wrote to memory of 1896 3280 766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\766ff58f7654237b7175c847fdd8ff83_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\Rqeloa.exeC:\Windows\Rqeloa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 9163⤵
- Program crash
PID:281068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1896 -ip 18961⤵PID:281040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5766ff58f7654237b7175c847fdd8ff83
SHA1ee99c051d52d15a5f8cd98ca223d40dca3538e09
SHA2564e1c3e1b5570dbbe0854634617be48d8f5b51be003d6f19656fad33f146b638d
SHA51211ff585f82000719009d3e74876db673b871933260989ecda4090475addd5a38fb8413f9bbaf9a22dedd62711a9dae3f4ba846e92b90b8d01f223c601351ded1
-
Filesize
390B
MD54c4fa16690801a50f77af02fb84fb9fb
SHA14e4d24c3efe879e65a871e49bde077373fc4a27e
SHA256a79a71f50cdc630fdfdaebc7c93fa7fc6fc41d7864cb0231310ba3faf3960bfa
SHA512a69a1c849ce714dac19191b6f35b0d9e485d3e2ea2d645f76463d8639906a138c0ca728e2404a052f8aeb4e588546e983d372d70b6e0c9e522b00dde7925552c