Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 23:19
Behavioral task
behavioral1
Sample
8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe
-
Size
37KB
-
MD5
8c61a50f39d0ca2ba857dffab7c8df2a
-
SHA1
257859717d83341342620d37724ec51618fdbd6e
-
SHA256
e705c4635dbb187a0643b949e6a192f21313305eb58b8d77d6c3895a94e362bb
-
SHA512
f480902cb9b2c781891bbd63cd498aa3cdd36d91b9bb5c94fef46ad0a9773486f3f0e9f75f70b711f265f0a8e5a25f9db04d21cfd0a2ccf67e15bdff75491701
-
SSDEEP
768:8WjSqC/6s4G6LX8zPFJAGK0qWkEIYOnp+Qx35tAqxdB6+PnEOq:Tn6gbi3BkBn+U3DzB6QEO
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\whnhjvc.sys 8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\whnhjvc.sys 8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2148-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2148-10-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\vFUS.dll 8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vFUS.dll 8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe File created C:\Windows\SysWOW64\79OGrB.bat 8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1956 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1956 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1676 2148 8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe 87 PID 2148 wrote to memory of 1676 2148 8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe 87 PID 2148 wrote to memory of 1676 2148 8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe 87 PID 1676 wrote to memory of 1956 1676 cmd.exe 89 PID 1676 wrote to memory of 1956 1676 cmd.exe 89 PID 1676 wrote to memory of 1956 1676 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c61a50f39d0ca2ba857dffab7c8df2a_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\79OGrB.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249B
MD57ca07aee72883b9910f9b4ef6d030cfd
SHA1c3fae615f7ca0fc224d774e16f2fc1adbcbfa15e
SHA256d40aae0b9ea95de8b3a309c50f51956a5a1371ac75854ef8e1045a7f1c70951b
SHA512c053ee2babddd704ab1a4f96d20ee732f2b298345e7901cd3798a084194c818aafd82769eba4ec67b2292dc70881721bf8a6c04b1498d9a66758f604efe3ce7b