Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
894e17b1ed92aa5ffba56b8c4a54413b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
894e17b1ed92aa5ffba56b8c4a54413b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
894e17b1ed92aa5ffba56b8c4a54413b_JaffaCakes118.exe
-
Size
209KB
-
MD5
894e17b1ed92aa5ffba56b8c4a54413b
-
SHA1
c4aea8e85ffcd0b12ae17785590ea8c2ac56b2ab
-
SHA256
f9a7cd8c4a2583cdc6e572372c428ce89c473ce9697528a4ee9c89ecde77f956
-
SHA512
7d741431a0d7b480edfa679cf3a1134fb5a145769390cbedb504e2cce7953625b23a6fa3bfdfaf30d3c5fe744799b1769e7dc488411f86debf1e2cedb0acda20
-
SSDEEP
6144:kjSiuyHDZP9/eOvdXQkWxKgewNJ0CksZ9VXg/:kjSaFAGlGxGsZ9dg/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1824 ogiqci.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ogiqci.exe 894e17b1ed92aa5ffba56b8c4a54413b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ogiqci.exe 894e17b1ed92aa5ffba56b8c4a54413b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1824 set thread context of 4580 1824 ogiqci.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 1928 4580 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 894e17b1ed92aa5ffba56b8c4a54413b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogiqci.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4356 894e17b1ed92aa5ffba56b8c4a54413b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1824 wrote to memory of 4580 1824 ogiqci.exe 85 PID 1824 wrote to memory of 4580 1824 ogiqci.exe 85 PID 1824 wrote to memory of 4580 1824 ogiqci.exe 85 PID 1824 wrote to memory of 4580 1824 ogiqci.exe 85 PID 1824 wrote to memory of 4580 1824 ogiqci.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\894e17b1ed92aa5ffba56b8c4a54413b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\894e17b1ed92aa5ffba56b8c4a54413b_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4356
-
C:\Windows\SysWOW64\ogiqci.exeC:\Windows\SysWOW64\ogiqci.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 123⤵
- Program crash
PID:1928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4580 -ip 45801⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5894e17b1ed92aa5ffba56b8c4a54413b
SHA1c4aea8e85ffcd0b12ae17785590ea8c2ac56b2ab
SHA256f9a7cd8c4a2583cdc6e572372c428ce89c473ce9697528a4ee9c89ecde77f956
SHA5127d741431a0d7b480edfa679cf3a1134fb5a145769390cbedb504e2cce7953625b23a6fa3bfdfaf30d3c5fe744799b1769e7dc488411f86debf1e2cedb0acda20