Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
89aba9ceb88629d916510df7c000a8ed_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
89aba9ceb88629d916510df7c000a8ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89aba9ceb88629d916510df7c000a8ed_JaffaCakes118.exe
-
Size
9.6MB
-
MD5
89aba9ceb88629d916510df7c000a8ed
-
SHA1
f20ceafa23ad84beefe76dd6493fd293d0736069
-
SHA256
5b9e341d687d887516d200115dec5d8cab8bd150b6cef867cb209fda8bdf7168
-
SHA512
528c3d31b7f22d7604e3ffd8cbe12cea19464df7f496eed3d2dbebde54d61763cd830d82fbe12433a421ad2718a72d2dd371a8a544b70acbb1f58384574e10b6
-
SSDEEP
6144:PIBIAh1JgogRZ44F4eGA2etBdy9cUlOG0P6loU:QPh7gomZ44F4eGA2etBdy93nY6lJ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\svcghkkjl.exe 89aba9ceb88629d916510df7c000a8ed_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 772 svcghkkjl.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\keys.ini 89aba9ceb88629d916510df7c000a8ed_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process 1720 772 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89aba9ceb88629d916510df7c000a8ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcghkkjl.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 772 wrote to memory of 1720 772 svcghkkjl.exe 31 PID 772 wrote to memory of 1720 772 svcghkkjl.exe 31 PID 772 wrote to memory of 1720 772 svcghkkjl.exe 31 PID 772 wrote to memory of 1720 772 svcghkkjl.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\89aba9ceb88629d916510df7c000a8ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89aba9ceb88629d916510df7c000a8ed_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3040
-
C:\Windows\SysWOW64\drivers\svcghkkjl.exeC:\Windows\SysWOW64\drivers\svcghkkjl.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 2042⤵
- Program crash
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.6MB
MD589aba9ceb88629d916510df7c000a8ed
SHA1f20ceafa23ad84beefe76dd6493fd293d0736069
SHA2565b9e341d687d887516d200115dec5d8cab8bd150b6cef867cb209fda8bdf7168
SHA512528c3d31b7f22d7604e3ffd8cbe12cea19464df7f496eed3d2dbebde54d61763cd830d82fbe12433a421ad2718a72d2dd371a8a544b70acbb1f58384574e10b6