Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe
-
Size
38KB
-
MD5
77aef9a722bfc94579cc4bf6535ddf67
-
SHA1
044bf9f35e9686aacebf663f93176f8617205d56
-
SHA256
262e46b982b3f41f14db92512c61c68188dd66871fb0aeb107120b0e50735ae1
-
SHA512
5fd0a1ff90649a9cf3c156585de89a8285b9089df940fded46517a5d2935e1f146365f07606cf102d7b89630f9fb3c4989b825ebbf298dc46adb675194cd3e8f
-
SSDEEP
768:X+RFmnbfWDut1vC+bHyBtMLNe28DUMaV9NvSEqf/Z+FKWF:ORFyWuq+bHyBtMLX8DUjVzFqMFKWF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2496 ntldr.exe -
Loads dropped DLL 6 IoCs
pid Process 3056 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe 3056 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe 2000 WerFault.exe 2000 WerFault.exe 2000 WerFault.exe 2000 WerFault.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RCXD20E.tmp 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ntldr.exe ntldr.exe File created C:\Windows\SysWOW64\ntldr.exe ntldr.exe File opened for modification C:\Windows\SysWOW64\ntldr.exe 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe File created C:\Windows\SysWOW64\ntldr.exe 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 308 3056 WerFault.exe 30 2000 2496 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntldr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2496 3056 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2496 3056 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2496 3056 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2496 3056 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe 31 PID 3056 wrote to memory of 308 3056 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe 32 PID 3056 wrote to memory of 308 3056 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe 32 PID 3056 wrote to memory of 308 3056 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe 32 PID 3056 wrote to memory of 308 3056 77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2000 2496 ntldr.exe 33 PID 2496 wrote to memory of 2000 2496 ntldr.exe 33 PID 2496 wrote to memory of 2000 2496 ntldr.exe 33 PID 2496 wrote to memory of 2000 2496 ntldr.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77aef9a722bfc94579cc4bf6535ddf67_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\ntldr.exe"C:\Windows\system32\ntldr.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 1243⤵
- Loads dropped DLL
- Program crash
PID:2000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 1242⤵
- Program crash
PID:308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD577aef9a722bfc94579cc4bf6535ddf67
SHA1044bf9f35e9686aacebf663f93176f8617205d56
SHA256262e46b982b3f41f14db92512c61c68188dd66871fb0aeb107120b0e50735ae1
SHA5125fd0a1ff90649a9cf3c156585de89a8285b9089df940fded46517a5d2935e1f146365f07606cf102d7b89630f9fb3c4989b825ebbf298dc46adb675194cd3e8f