Analysis
-
max time kernel
18s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28/07/2024, 01:23
Behavioral task
behavioral1
Sample
04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe
-
Size
275KB
-
MD5
04c815166ad8fa7b4a80017fb6770296
-
SHA1
b28d4b66251c25bd93e450bee939652c7a3241d2
-
SHA256
7e2da686b350d7ec646ca94b3c00b38d64ba8faa3a059f407a67a4cab261b49d
-
SHA512
0a54d669b5ab856f036ad94e3506b03918e90086403497124a00b1cd116b7a1b639bbc5824ebfb0adec94eb6830336519f53d5c067df9103be056b95d63808d1
-
SSDEEP
6144:XUZyaM83nLbxKVJ3nCMkQe5HZAsHFZlxz:5lgsHyMqLHFZlxz
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0009000000023453-3.dat aspack_v212_v242 behavioral2/files/0x00070000000234a6-17.dat aspack_v212_v242 -
Executes dropped EXE 4 IoCs
pid Process 2060 MSWDM.EXE 4440 MSWDM.EXE 3664 04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE 4240 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe File opened for modification C:\Windows\devC62E.tmp 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe File opened for modification C:\Windows\devC62E.tmp MSWDM.EXE -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4440 MSWDM.EXE 4440 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 808 wrote to memory of 2060 808 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 84 PID 808 wrote to memory of 2060 808 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 84 PID 808 wrote to memory of 2060 808 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 84 PID 808 wrote to memory of 4440 808 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 85 PID 808 wrote to memory of 4440 808 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 85 PID 808 wrote to memory of 4440 808 04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe 85 PID 4440 wrote to memory of 3664 4440 MSWDM.EXE 86 PID 4440 wrote to memory of 3664 4440 MSWDM.EXE 86 PID 4440 wrote to memory of 3664 4440 MSWDM.EXE 86 PID 4440 wrote to memory of 4240 4440 MSWDM.EXE 87 PID 4440 wrote to memory of 4240 4440 MSWDM.EXE 87 PID 4440 wrote to memory of 4240 4440 MSWDM.EXE 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devC62E.tmp!C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe! !2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3664
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devC62E.tmp!C:\Users\Admin\AppData\Local\Temp\04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD521f207a22599f995cdfc94eb07ab1532
SHA1842f3da10d8463c303decf938b6cb58b1fd830e2
SHA256cf89a69f89da511ac32875a7e62dd4daf2501aac2965a4340cd1034da24b72e2
SHA512958ba39c7b6a8bd2faa0301e8c840b04dfe343581b37251cd7262c4b1a8f76230bf93da64da48c25e4cad1c524550558057ec9d6204e90756cdff2435c4d4a1c
-
Filesize
39KB
MD5f518dffaf1cdc2a1bc025a7703010dea
SHA1b63ee1f346d540bdc79a335894794b7878e75cc3
SHA256dbb3d78a784cd556b873566eb869699eb9f11b9c4142c17ca7e48fd408b5d122
SHA51225b5c2dc6819a4d90f79eecaa5e1cda47942c9d5b1a923710d9344dbe7ab47c2c3371fd1ff79dfdd95ac2a3d09a09bcebf4695b15cea6933e5a90936c365dab7
-
Filesize
236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a