Analysis
-
max time kernel
8s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28/07/2024, 01:23
Behavioral task
behavioral1
Sample
04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe
-
Size
275KB
-
MD5
04c815166ad8fa7b4a80017fb6770296
-
SHA1
b28d4b66251c25bd93e450bee939652c7a3241d2
-
SHA256
7e2da686b350d7ec646ca94b3c00b38d64ba8faa3a059f407a67a4cab261b49d
-
SHA512
0a54d669b5ab856f036ad94e3506b03918e90086403497124a00b1cd116b7a1b639bbc5824ebfb0adec94eb6830336519f53d5c067df9103be056b95d63808d1
-
SSDEEP
6144:XUZyaM83nLbxKVJ3nCMkQe5HZAsHFZlxz:5lgsHyMqLHFZlxz
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00080000000120fe-13.dat aspack_v212_v242 -
Executes dropped EXE 4 IoCs
pid Process 1748 MSWDM.EXE 1484 MSWDM.EXE 2780 04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE 2912 MSWDM.EXE -
Loads dropped DLL 4 IoCs
pid Process 1748 MSWDM.EXE 2780 04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE 2780 04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE 2780 04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe File opened for modification C:\Windows\devC5FD.tmp 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1748 MSWDM.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1484 2308 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 30 PID 2308 wrote to memory of 1484 2308 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 30 PID 2308 wrote to memory of 1484 2308 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 30 PID 2308 wrote to memory of 1484 2308 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 30 PID 2308 wrote to memory of 1748 2308 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1748 2308 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1748 2308 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1748 2308 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 31 PID 1748 wrote to memory of 2780 1748 MSWDM.EXE 32 PID 1748 wrote to memory of 2780 1748 MSWDM.EXE 32 PID 1748 wrote to memory of 2780 1748 MSWDM.EXE 32 PID 1748 wrote to memory of 2780 1748 MSWDM.EXE 32 PID 1748 wrote to memory of 2780 1748 MSWDM.EXE 32 PID 1748 wrote to memory of 2780 1748 MSWDM.EXE 32 PID 1748 wrote to memory of 2780 1748 MSWDM.EXE 32 PID 1748 wrote to memory of 2912 1748 MSWDM.EXE 33 PID 1748 wrote to memory of 2912 1748 MSWDM.EXE 33 PID 1748 wrote to memory of 2912 1748 MSWDM.EXE 33 PID 1748 wrote to memory of 2912 1748 MSWDM.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devC5FD.tmp!C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devC5FD.tmp!C:\Users\Admin\AppData\Local\Temp\04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE!3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
Filesize
39KB
MD5f518dffaf1cdc2a1bc025a7703010dea
SHA1b63ee1f346d540bdc79a335894794b7878e75cc3
SHA256dbb3d78a784cd556b873566eb869699eb9f11b9c4142c17ca7e48fd408b5d122
SHA51225b5c2dc6819a4d90f79eecaa5e1cda47942c9d5b1a923710d9344dbe7ab47c2c3371fd1ff79dfdd95ac2a3d09a09bcebf4695b15cea6933e5a90936c365dab7