Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe
-
Size
225KB
-
MD5
843af912fff6ee44d7aaf4e9f625f509
-
SHA1
7721563ba449f133f2592927d16c5a65da27ed19
-
SHA256
c22c15b1fa25f120fe98f22241b86daf93addea99e92bdbb2945744b1f584d81
-
SHA512
e1e4061e5ca54e60c9a4360f3c26aede755c0ed67e6bda998949b4eda894d14411cf65b5a2a08a0a607ce07f3df48639145ad37e3ad2c34de4636aa8efed3c65
-
SSDEEP
6144:yNxJdew0qZfYp+cWZaKJ9VaJtPjtixbwSpMel:wJww0UfYpvi/TAPJixUSpM
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\qandr.sys frame2_276.exe -
Executes dropped EXE 2 IoCs
pid Process 1764 frame2_276.exe 2132 liar3.exe -
Loads dropped DLL 3 IoCs
pid Process 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0008000000016cae-11.dat upx behavioral1/memory/2132-16-0x0000000000400000-0x000000000044A000-memory.dmp upx behavioral1/memory/2132-36-0x0000000000400000-0x000000000044A000-memory.dmp upx behavioral1/memory/2132-37-0x0000000000400000-0x000000000044A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssysif = "C:\\Windows\\system32\\liar3.exe" reg.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\liar3.exe cmd.exe File opened for modification C:\Windows\SysWOW64\liar3.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2868 1764 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language liar3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2592 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 30 PID 2416 wrote to memory of 2592 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 30 PID 2416 wrote to memory of 2592 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 30 PID 2416 wrote to memory of 2592 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 30 PID 2592 wrote to memory of 1788 2592 net.exe 32 PID 2592 wrote to memory of 1788 2592 net.exe 32 PID 2592 wrote to memory of 1788 2592 net.exe 32 PID 2592 wrote to memory of 1788 2592 net.exe 32 PID 2416 wrote to memory of 1764 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 33 PID 2416 wrote to memory of 1764 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 33 PID 2416 wrote to memory of 1764 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 33 PID 2416 wrote to memory of 1764 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 33 PID 2416 wrote to memory of 2132 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 34 PID 2416 wrote to memory of 2132 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 34 PID 2416 wrote to memory of 2132 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 34 PID 2416 wrote to memory of 2132 2416 843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe 34 PID 2132 wrote to memory of 1488 2132 liar3.exe 37 PID 2132 wrote to memory of 1488 2132 liar3.exe 37 PID 2132 wrote to memory of 1488 2132 liar3.exe 37 PID 2132 wrote to memory of 1488 2132 liar3.exe 37 PID 2132 wrote to memory of 1616 2132 liar3.exe 39 PID 2132 wrote to memory of 1616 2132 liar3.exe 39 PID 2132 wrote to memory of 1616 2132 liar3.exe 39 PID 2132 wrote to memory of 1616 2132 liar3.exe 39 PID 2132 wrote to memory of 2020 2132 liar3.exe 41 PID 2132 wrote to memory of 2020 2132 liar3.exe 41 PID 2132 wrote to memory of 2020 2132 liar3.exe 41 PID 2132 wrote to memory of 2020 2132 liar3.exe 41 PID 2020 wrote to memory of 1776 2020 cmd.exe 43 PID 2020 wrote to memory of 1776 2020 cmd.exe 43 PID 2020 wrote to memory of 1776 2020 cmd.exe 43 PID 2020 wrote to memory of 1776 2020 cmd.exe 43 PID 2132 wrote to memory of 1284 2132 liar3.exe 44 PID 2132 wrote to memory of 1284 2132 liar3.exe 44 PID 2132 wrote to memory of 1284 2132 liar3.exe 44 PID 2132 wrote to memory of 1284 2132 liar3.exe 44 PID 1284 wrote to memory of 2104 1284 cmd.exe 46 PID 1284 wrote to memory of 2104 1284 cmd.exe 46 PID 1284 wrote to memory of 2104 1284 cmd.exe 46 PID 1284 wrote to memory of 2104 1284 cmd.exe 46 PID 2132 wrote to memory of 2016 2132 liar3.exe 47 PID 2132 wrote to memory of 2016 2132 liar3.exe 47 PID 2132 wrote to memory of 2016 2132 liar3.exe 47 PID 2132 wrote to memory of 2016 2132 liar3.exe 47 PID 2132 wrote to memory of 2628 2132 liar3.exe 49 PID 2132 wrote to memory of 2628 2132 liar3.exe 49 PID 2132 wrote to memory of 2628 2132 liar3.exe 49 PID 2132 wrote to memory of 2628 2132 liar3.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\windows\SysWOW64\net.exe"C:\windows\system32\net.exe" stop wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:1788
-
-
-
C:\Users\Admin\AppData\Local\Temp\frame2_276.exe"C:\Users\Admin\AppData\Local\Temp\frame2_276.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 2003⤵
- Program crash
PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\liar3.exe"C:\Users\Admin\AppData\Local\Temp\liar3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy /Y "C:\Users\Admin\AppData\Local\Temp\liar3.exe" C:\Windows\system32\3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del /Q /F C:\Windows\temp\liar3.exe3⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\reg.exe delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v mssysif /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v mssysif /f4⤵
- System Location Discovery: System Language Discovery
PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /v mssysif /d "C:\Windows\system32\liar3.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /v mssysif /d "C:\Windows\system32\liar3.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c type C:\Windows\Tasks\2961475164-00203⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c type C:\Windows\Tasks\2961475164-00203⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD552d914c8fa26ae793b012c68291719f9
SHA171974b58f8de726790b3eadea931a73bf7bad1cd
SHA256b77333164092b48615c8826ac7694f47819f070f6cc793d62363844a8c49c20f
SHA5129ac6801fce8f8b49e15302932dd0198c8c0bf0e5ce7f48899081420ad774781d66d10d341e1c845252179b0caad0568a16f7b83fe109a5165976a2e95d70342e
-
Filesize
57KB
MD5c75a9e75f5dc84b3d4769a29759dabee
SHA1a792aab93744e9ba579564955bac31a6cbfb6d2e
SHA25607f1f51821713642e753d3477f30b15c09a43fde4846a7d79dca16afe9e06c99
SHA51236ffa7d59e18d8655dd187488654a77dfbbbb3cbc32328711167afb3d871f319ce5b95cdcdb01a9aaecdf88001ff427a0a2e9f41481bb07070d2dde30614147c