Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
86d367c303179ad491d9d119e75949b3
-
SHA1
cd49a9d1b1c45812bebc0f9955352cbf4ef4d78c
-
SHA256
d550a80e06ef8e830635edeab09d409ad63132532a024c9404ad1b953b655589
-
SHA512
a9679d652a09c2f54f8103c3d1474fe25b0b7989bb95bf7dc15be24a42361ff99d603fa13f12b03c27635f13bcefbc069f5c2a02f390524d31d84eef15d36fff
-
SSDEEP
24576:HQLChSl9ZXWnsIztLwCusXxmE7Islf0ahnReToj1g0U:wCwV6VtXuiLlf0a1ETFh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2336 19230.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 904 2336 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19230.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2532 86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe 2532 86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2336 2532 86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2336 2532 86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2336 2532 86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2336 2532 86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe 30 PID 2336 wrote to memory of 904 2336 19230.exe 31 PID 2336 wrote to memory of 904 2336 19230.exe 31 PID 2336 wrote to memory of 904 2336 19230.exe 31 PID 2336 wrote to memory of 904 2336 19230.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\86d367c303179ad491d9d119e75949b3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\19230.exec:\19230.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 363⤵
- Program crash
PID:904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
718KB
MD54f98fc4947466f46812a1cfe636258cf
SHA1f7669ea874969a43ab319db86ee451ac7eb708cf
SHA256b96995ff6de1b2a75f498efd30e3bc1d97f7c3707e7fe36af363e6f9f4b2e993
SHA5123eccb0a2c861cfe1a0fd7dcad2d3846b4d0b24715377cbd7324ed7c3ba81a9542ebe68b5f9b27811797a660e47ed86d37f6b4f423e36c1b914bfcedd4ea95365