Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 05:29
Behavioral task
behavioral1
Sample
84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe
-
Size
137KB
-
MD5
84f43389866cb5b26de8d0768b977501
-
SHA1
d22164b6b0a60a2dd87c123df768ba91b4ac6cfd
-
SHA256
bf5ae83cae9a624f06ef2b6df13b042c51c35fb9a76a7c489f3b291c337ffc04
-
SHA512
714f2797fd77c4abafdd5001dbe9f8ca4095866945cd101aedd6997bf79a83782ef76256f35e40f7b3d0305600843c89e941697478d504136f7920a839dc8bbb
-
SSDEEP
3072:KUzAFO89eYdtw0i1ZHqSj9JDJ8k3QCLYCYo2vCiZqlWIkEocnbTJf:4Fr9NGHqSLDJ86QC0CR2a0sWIkWbT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2452 Vxylea.exe -
resource yara_rule behavioral1/memory/2488-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0008000000015d0e-11.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe File created C:\Windows\Vxylea.exe 84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe File opened for modification C:\Windows\Vxylea.exe 84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Vxylea.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Vxylea.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vxylea.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main Vxylea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe 2452 Vxylea.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2488 84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe 2452 Vxylea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2452 2488 84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2452 2488 84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2452 2488 84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2452 2488 84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84f43389866cb5b26de8d0768b977501_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\Vxylea.exeC:\Windows\Vxylea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD5748e6900aa7b2c1b092df04b0710124a
SHA1acac420fcf7ab409e73810c1f41f749d1281cb5e
SHA256539b10f4cdf2e0b9ce3b9cd0ee4c674f5420a5e8da2ab3b29605b34f541de67d
SHA5125112f2080da7e23b4308e521ed5fb4c4d1d4f108e5228d996cf374d7726da1f05e1054a4d035d436eae757a925ba8b4c3b78b94e17f889a49f7fa66abe54dd7f
-
Filesize
137KB
MD584f43389866cb5b26de8d0768b977501
SHA1d22164b6b0a60a2dd87c123df768ba91b4ac6cfd
SHA256bf5ae83cae9a624f06ef2b6df13b042c51c35fb9a76a7c489f3b291c337ffc04
SHA512714f2797fd77c4abafdd5001dbe9f8ca4095866945cd101aedd6997bf79a83782ef76256f35e40f7b3d0305600843c89e941697478d504136f7920a839dc8bbb