Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 11:06
Behavioral task
behavioral1
Sample
77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe
-
Size
12KB
-
MD5
77fa184cdd4378f8208bcc5b21d0d09b
-
SHA1
a73264909a0ec535c7e951c57ea920fc6788f8b5
-
SHA256
71d8d202206b566417643609d5f7aeda67d25f958679a4204f1cb87a263559be
-
SHA512
03c0df709592c3159af0853edf36e2ba8d05ba7515876318aba3712b9b3d1cde91ac22f6ee36899d9ae856a73567a5c648843b73963c4005faa5a0e5d5bc4217
-
SSDEEP
192:bJpJTqFxHECxNKSjXuCiCSIC4m/mBaswbDSN2gg36r2P8dnLIWuCTwRbbVMzjeWC:FmFNECbSIG/HswHi2gghknLulgjeWg9
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2448 fliecodsk.exe -
resource yara_rule behavioral2/memory/1108-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x00070000000234b4-4.dat upx behavioral2/memory/1108-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/2448-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\fliecods.dll 77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe File created C:\Windows\SysWOW64\fliecodsk.exe 77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fliecodsk.exe 77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fliecodsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1108 wrote to memory of 2448 1108 77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe 84 PID 1108 wrote to memory of 2448 1108 77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe 84 PID 1108 wrote to memory of 2448 1108 77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe 84 PID 1108 wrote to memory of 4376 1108 77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe 97 PID 1108 wrote to memory of 4376 1108 77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe 97 PID 1108 wrote to memory of 4376 1108 77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\fliecodsk.exeC:\Windows\system32\fliecodsk.exe ˜‰2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\77fa184cdd4378f8208bcc5b21d0d09b_JaffaCakes118.exe.bat2⤵
- System Location Discovery: System Language Discovery
PID:4376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD59026e247088b523526c370006cec3179
SHA1bb5d0ec85ebed153e1dbf497daa539e226967e34
SHA2561578388dc3aa4160260ac1ca840a2a8a6b8642aad46c42f2b8a6e40de3d410d1
SHA51225d2ff40f6524b97eb1ec94c6a44748677cd4cd73cc86c4e0b17b078bc1490a3122a8273080e72b857c88f781e869265b68e55d6dc29e3a64f3d170ef019937b
-
Filesize
12KB
MD577fa184cdd4378f8208bcc5b21d0d09b
SHA1a73264909a0ec535c7e951c57ea920fc6788f8b5
SHA25671d8d202206b566417643609d5f7aeda67d25f958679a4204f1cb87a263559be
SHA51203c0df709592c3159af0853edf36e2ba8d05ba7515876318aba3712b9b3d1cde91ac22f6ee36899d9ae856a73567a5c648843b73963c4005faa5a0e5d5bc4217