Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe
-
Size
147KB
-
MD5
88f765f569dd3558228e0a7a8c5e22d9
-
SHA1
ccacb555c79cd449169da8a6d0bd8b863aaedb2b
-
SHA256
46768c1281dea1d72167cc5f7901f9a12588e69323a34d7ffbdb71662c11fdd5
-
SHA512
d258b625b485c1e2eeddd04047ea16202b341d5ee50dc1b8d45dfc7be44ca465f23a66053b67e368b129dbfdc0b2f8fafad2ad777c5bf45d48b387207922a95a
-
SSDEEP
3072:gCTCd857nhEcMiplVvauR3C9DthcASPQuHJZt7:gW57hEh0jrC9D6HZ7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1896 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 server.exe -
Loads dropped DLL 2 IoCs
pid Process 1868 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe 1868 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 server.exe 2396 server.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2396 1868 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2396 1868 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2396 1868 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2396 1868 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1240 2396 server.exe 21 PID 2396 wrote to memory of 1240 2396 server.exe 21 PID 2396 wrote to memory of 1240 2396 server.exe 21 PID 2396 wrote to memory of 1240 2396 server.exe 21 PID 2396 wrote to memory of 1240 2396 server.exe 21 PID 2396 wrote to memory of 1240 2396 server.exe 21 PID 1868 wrote to memory of 1896 1868 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe 31 PID 1868 wrote to memory of 1896 1868 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe 31 PID 1868 wrote to memory of 1896 1868 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe 31 PID 1868 wrote to memory of 1896 1868 88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88f765f569dd3558228e0a7a8c5e22d9_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\88F765~1.EXE >> NUL3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD59d44a4beecc3901f4a46e7abcfda3625
SHA1ffeaaf46a336ab7a087fb569a7ef51b9a8fbcf44
SHA256db65c09c1e806943b1d40da13dd9298571a25a1c52f2164680e07340ad0eeee2
SHA512fee8af4174d7efdb7888e7f69ef3c239114762c0cf1f4ac88898455f3e3d2c5d169c6c175cc85ae52b103eeb194e6efef122054d4887b012c4aac9a31aa67ebf