Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe
-
Size
771KB
-
MD5
8406c8b731646404dd9613dddb972cbb
-
SHA1
b310d1a6ca066e9d0c212130933aa48c4ed40b9d
-
SHA256
8bebd54edfffa8cbd4769982178f1cb04df9b89eaaa8ba972c985a65668e1897
-
SHA512
2e0630b31a5485bbd9061bdf25410b1e72d037b842ce94459bb4a2209bb0944167f5f00fdcbd1d2fd9cd371c60b9877902f8071d202541381f942960f01741d8
-
SSDEEP
24576:q3nZqfbhTY+xfLKxVSZKrVf3B7YG01hX85WnBYHATuM68a:qGxfLKxVyqVfx7euYB+AT08a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1952 5.EXE -
Loads dropped DLL 9 IoCs
pid Process 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 2160 WerFault.exe 2160 WerFault.exe 2160 WerFault.exe 2160 WerFault.exe 2160 WerFault.exe -
resource yara_rule behavioral1/files/0x0007000000015d4b-7.dat upx behavioral1/memory/1952-19-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1952-25-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\%system%\aaa.jpg 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\%system%\aaa.jpg 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe File created C:\Program Files (x86)\%system%\5.exe 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\%system%\5.exe 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\%system% 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe File created C:\Program Files (x86)\%system%\__tmp_rar_sfx_access_check_259446448 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2160 1952 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1952 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 30 PID 2212 wrote to memory of 1952 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 30 PID 2212 wrote to memory of 1952 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 30 PID 2212 wrote to memory of 1952 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 30 PID 2212 wrote to memory of 1952 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 30 PID 2212 wrote to memory of 1952 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 30 PID 2212 wrote to memory of 1952 2212 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2160 1952 5.EXE 31 PID 1952 wrote to memory of 2160 1952 5.EXE 31 PID 1952 wrote to memory of 2160 1952 5.EXE 31 PID 1952 wrote to memory of 2160 1952 5.EXE 31 PID 1952 wrote to memory of 2160 1952 5.EXE 31 PID 1952 wrote to memory of 2160 1952 5.EXE 31 PID 1952 wrote to memory of 2160 1952 5.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\%system%\5.EXE"C:\Program Files (x86)\%system%\5.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1963⤵
- Loads dropped DLL
- Program crash
PID:2160
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD5fab4606dfa5e3ffd33c436c53c1e07b6
SHA170bd8e2dde60b1d13bba0e4309cf98c0ba10806c
SHA256a4a5107092f4ef640a2dcf0dc5cc8a8e6c161b1f9bbc272d06c70b38556e043a
SHA512db692b94d207cc6669ed14c534f3ad309fc5ce95e1dc4336d377a929a027a8c30095c60f91ef92d274f8340adf3785ad226cadf606e630f833587ddefd47f53d