Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe
-
Size
57KB
-
MD5
8c01880e00449f251c9c0c8aeded1910
-
SHA1
af1f0688f6aa84fbf3561bde0a0f93bb13f850a7
-
SHA256
bcfa60ea21b3f1d94c630aaa6de94e6b01b995cf9886fd7adb30cce110e4bb9e
-
SHA512
ed1789906a38855877e1ba33cd6303486d94d22c22e4863416b55e2b7970062a87839d4572fd80611e0ac2de7b5dd299a9f6e84ce9cecb092689798560313fa5
-
SSDEEP
768:x3lrPxlT3w0XtqmI086s16Rr2Y/i6J0AS1ndnUg/kpOnpkRHyPO/tNce8SpA7:7PT3wcxlq6Rr28TxuVUzpekkGce8Sg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2564 sfx9E81.tmp -
Loads dropped DLL 2 IoCs
pid Process 3016 8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe 3016 8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfx9E81.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2564 sfx9E81.tmp 2564 sfx9E81.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2564 3016 8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2564 3016 8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2564 3016 8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2564 3016 8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\sfx9E81.tmp-F:C:\Users\Admin\AppData\Local\Temp\sd9E82.tmp2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD54b2dfb76b5eebdc3702dcacef08fc0aa
SHA14ba7bebf533c2aa80dfdb399d3a725e6b095ef15
SHA2561233624787a9be3bb9127adadd21fc649d6fe87ad33b55dd44ee807a24ffb9a4
SHA51211dfc1ee0f163e05dffe14fb12541807a72e1d8a975fb7be94c4091a43fff4f55ad066aaf7e075eb0dcc594d4255d1f5a4100ba3a7924e82bda48357a39d9c39
-
Filesize
92KB
MD5fab0d4e38d26958e0d5db94706bc8d02
SHA1d4f0dd9c451ddc01dbc06085d5465b7971c07886
SHA256b83b0b7a8e4ec464142c25b8846ade14d24c48cb1fb4f93415723d64f98fc45c
SHA512e93574aa92be5e4b7eb605292fa83b06c26f5c6d05b5f3f4a685cc74c81c2c1140957400eae4d9f7f3558c12d87315d8414441bf9e32a91d5a6aff9bef803060