Analysis
-
max time kernel
30s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
81c95b8af4147bdff145d58808608c9f_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
81c95b8af4147bdff145d58808608c9f_JaffaCakes118.exe
-
Size
9.2MB
-
MD5
81c95b8af4147bdff145d58808608c9f
-
SHA1
6818e76e76ff7d9a0ded4d7c3cdb0bc41365e556
-
SHA256
bee5b3626c14fe054f41e79ad546415801d17222c9a18e778a1e997a2d12a76c
-
SHA512
ac72697f51f042934fb987da6e5f932c4471398564f4d0b6ab57238f6326fe0fbf83d062711d9190a714b738f781a2f963baf3d2ec2490c97303a56603ecbbd0
-
SSDEEP
3072:FS9/gCQ+2mI7DLn7o/EAJXQLSX3+2mI7DLn7o/EAJXQLSXSiafoVNEqrfSacCclQ:YtjImELSujImELSzafUNEqDSacCmli
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\svzoolv.exe 81c95b8af4147bdff145d58808608c9f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 svzoolv.exe -
resource yara_rule behavioral1/memory/1496-3-0x0000000000400000-0x0000000000D3A000-memory.dmp upx behavioral1/memory/2296-7-0x0000000000400000-0x0000000000D3A000-memory.dmp upx behavioral1/memory/1496-8-0x0000000000400000-0x0000000000D3A000-memory.dmp upx behavioral1/memory/2296-9-0x0000000000400000-0x0000000000D3A000-memory.dmp upx behavioral1/memory/1496-14-0x0000000000400000-0x0000000000D3A000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\keys.ini 81c95b8af4147bdff145d58808608c9f_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1640 2296 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svzoolv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1640 2296 svzoolv.exe 31 PID 2296 wrote to memory of 1640 2296 svzoolv.exe 31 PID 2296 wrote to memory of 1640 2296 svzoolv.exe 31 PID 2296 wrote to memory of 1640 2296 svzoolv.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\81c95b8af4147bdff145d58808608c9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81c95b8af4147bdff145d58808608c9f_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
PID:1496
-
C:\Windows\SysWOW64\drivers\svzoolv.exeC:\Windows\SysWOW64\drivers\svzoolv.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 2002⤵
- Program crash
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.2MB
MD581c95b8af4147bdff145d58808608c9f
SHA16818e76e76ff7d9a0ded4d7c3cdb0bc41365e556
SHA256bee5b3626c14fe054f41e79ad546415801d17222c9a18e778a1e997a2d12a76c
SHA512ac72697f51f042934fb987da6e5f932c4471398564f4d0b6ab57238f6326fe0fbf83d062711d9190a714b738f781a2f963baf3d2ec2490c97303a56603ecbbd0