Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 21:29
Behavioral task
behavioral1
Sample
81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe
-
Size
14KB
-
MD5
81ca4fa155911c1b4f95956ed30436a9
-
SHA1
b0733b904242fe5b203a6b2eb05f2bb5487bac0b
-
SHA256
dce6a961bd95deed8475dd38957be5abdc81bc1ddd5ab868dda83fafc45e645a
-
SHA512
2bc9fc0ae14161841a1ace042a05a35e04018c8eddbc42190c855eb00425c5a119a20360e1284a15d5fd22e2d361043e2c196eff327e2a6f4459c0e02c13bfbe
-
SSDEEP
192:Avqnd6LuKQJqYD6pn9G8WIx1JkGhIr4oa4E9/bxSF/cIlk+tP16My21xDMNC61Sa:ACdXrJ7D6ZkIx1Jkd4xlf+qO1hFlJ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2408-0-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2408-2-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2408-35-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\blolou.txt cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2764 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 31 PID 2408 wrote to memory of 2764 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 31 PID 2408 wrote to memory of 2764 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 31 PID 2408 wrote to memory of 2764 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2784 2764 cmd.exe 32 PID 2764 wrote to memory of 2784 2764 cmd.exe 32 PID 2764 wrote to memory of 2784 2764 cmd.exe 32 PID 2764 wrote to memory of 2784 2764 cmd.exe 32 PID 2408 wrote to memory of 2276 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 34 PID 2408 wrote to memory of 2276 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 34 PID 2408 wrote to memory of 2276 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 34 PID 2408 wrote to memory of 2276 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 34 PID 2276 wrote to memory of 1604 2276 cmd.exe 35 PID 2276 wrote to memory of 1604 2276 cmd.exe 35 PID 2276 wrote to memory of 1604 2276 cmd.exe 35 PID 2276 wrote to memory of 1604 2276 cmd.exe 35 PID 2408 wrote to memory of 892 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 36 PID 2408 wrote to memory of 892 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 36 PID 2408 wrote to memory of 892 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 36 PID 2408 wrote to memory of 892 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 36 PID 892 wrote to memory of 2228 892 cmd.exe 37 PID 892 wrote to memory of 2228 892 cmd.exe 37 PID 892 wrote to memory of 2228 892 cmd.exe 37 PID 892 wrote to memory of 2228 892 cmd.exe 37 PID 2408 wrote to memory of 2864 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 38 PID 2408 wrote to memory of 2864 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 38 PID 2408 wrote to memory of 2864 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 38 PID 2408 wrote to memory of 2864 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 38 PID 2408 wrote to memory of 2848 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 39 PID 2408 wrote to memory of 2848 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 39 PID 2408 wrote to memory of 2848 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 39 PID 2408 wrote to memory of 2848 2408 81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81ca4fa155911c1b4f95956ed30436a9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c echo system > C:\Windows\System32\blolou.txt2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd.exe /c echo system3⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c ren C:\Windows\System32\temp1 msnmsgs.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ren C:\Windows\System32\temp1 msnmsgs.exe3⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c ren C:\Windows\System32\temp2 winn32t.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ren C:\Windows\System32\temp2 winn32t.exe3⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\System32\msnmsgs.exe2⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\System32\winn32t.exe2⤵
- System Location Discovery: System Language Discovery
PID:2848
-