Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 04:11
Behavioral task
behavioral1
Sample
7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe
-
Size
185KB
-
MD5
7f1fda5c3e6515b61fa48f5744572b5c
-
SHA1
f5e5283f511c4e6e7ff1ba4bb91acfc17653a58f
-
SHA256
2c25e31ddcb7ce79670b67ce57d5e6a4b0c7e13d870ee25a8bbdd18807ee5d32
-
SHA512
e123298022c743f8b675c93fd2d112af7cccee6c0fae75fbeeb2c6b20df446a582a8b09ee52b788638b9ebb69e6319bf4fb95865ca6989ef254b18d9111fb5cf
-
SSDEEP
1536:TPwN8ukP5sZK20EGIBpwW6NeleEQ77nuUWXJmU2Ajpf8oI4KEAUg2uI:Thuk8QsH47nW5ppkoI4KEAUg2p
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3036 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
huter.exepid process 2488 huter.exe -
Loads dropped DLL 1 IoCs
Processes:
7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exepid process 3048 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exehuter.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exedescription pid process target process PID 3048 wrote to memory of 2488 3048 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe huter.exe PID 3048 wrote to memory of 2488 3048 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe huter.exe PID 3048 wrote to memory of 2488 3048 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe huter.exe PID 3048 wrote to memory of 2488 3048 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe huter.exe PID 3048 wrote to memory of 3036 3048 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe cmd.exe PID 3048 wrote to memory of 3036 3048 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe cmd.exe PID 3048 wrote to memory of 3036 3048 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe cmd.exe PID 3048 wrote to memory of 3036 3048 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2488
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5ede6388dfbb03ff576508b085d03e793
SHA171d2e779ac6ed074b5698651a8c7fa3b047ccb50
SHA256779c0d78580692dadb2978ddfcd44d68f8282bb3453c638c9a4c2feecc1b96f8
SHA512097e3b9b2ad80944e542785db3a9062ecb2c657192d96659dcc5267f362b186c91722f2bc103f19ef895e6d9821cf33d262569fae23605888d75f38d2e30093b
-
Filesize
302B
MD5e41ea93eca438a829239de74778164d8
SHA1e8c7977b3f2a2576203367a4261c6c0c304973b7
SHA256b8db3e9caa1afbf59716814ed8fe2bafe499241db7bf4178ff7ea0623fc74fd4
SHA512071ad2968d8b3a1fe3c5a6e454fc16868d3cb1273857f28a063971a39e17350aa82ac46e98e82637dc61c299ccf9265c74b36bc4f0382840ca33468fed391bd3
-
Filesize
185KB
MD5b85f9662eca31e83cc33467eb564f05a
SHA1c05209e101a248c0ef7d021a9ad671281bfff157
SHA2565eda2e49b7dcccef66b66d1af8968c7aa2ab4405498d8ce70e00f5b7dfd10f9a
SHA512671e22bd8d7ae9ed6ebe833b35c7b1372b2cf58e8e456d208bc04fccf223614dae83f29e362151cb23eb53ea67d9f7696ab7bcc3ece7512717b7ceea60c82a69