Analysis
-
max time kernel
140s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 04:59
Behavioral task
behavioral1
Sample
8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe
-
Size
351KB
-
MD5
8d693029cddf88f890c47f7cc60b58a8
-
SHA1
c5d0a280952b06612206168991c5fd93fbbb58b1
-
SHA256
d04544f5bdc06884d71d095b7f7048a7a4c86a5177787deaab076d52b3246203
-
SHA512
d75235c02a7edf6448175b7ffcd6d3985802ff29f05ffd69a2415afb377155a54737daf776c0ad59517563ea3d3ba1c278a9943e58a8d620df0e38ff60f609e4
-
SSDEEP
3072:rqRAFgKD5iLDeZl/AtADljPzXbMrawgkeAubbixuB2MiOQHQRvOxop0o:rqKgmwfeZlVt7graw1uKoQwUn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1540 Kkiqya.exe -
resource yara_rule behavioral2/memory/944-0-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/files/0x000a000000023449-11.dat upx behavioral2/memory/1540-13-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Kkiqya.exe 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe File opened for modification C:\Windows\Kkiqya.exe 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Kkiqya.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Kkiqya.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 102160 1540 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkiqya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main Kkiqya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe 1540 Kkiqya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 944 wrote to memory of 1540 944 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe 89 PID 944 wrote to memory of 1540 944 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe 89 PID 944 wrote to memory of 1540 944 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\Kkiqya.exeC:\Windows\Kkiqya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 6083⤵
- Program crash
PID:102160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1540 -ip 15401⤵PID:102136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351KB
MD58d693029cddf88f890c47f7cc60b58a8
SHA1c5d0a280952b06612206168991c5fd93fbbb58b1
SHA256d04544f5bdc06884d71d095b7f7048a7a4c86a5177787deaab076d52b3246203
SHA512d75235c02a7edf6448175b7ffcd6d3985802ff29f05ffd69a2415afb377155a54737daf776c0ad59517563ea3d3ba1c278a9943e58a8d620df0e38ff60f609e4
-
Filesize
390B
MD55f0551e800f3d7b9547997bcdce3fd4d
SHA11a061f7e49eb4b30e5cdb81bc34cecd885a11a18
SHA256af39d015e1976f8fe3e5bd4d56f045cf01c6f0ae8304581f251ccee8051feeac
SHA51286673a6a12294597cf5782bcc9c3b0074a5672673600170ca2052a00ea6855189c4f72d81e8b9b550f20bc8cb8bbac9a2e52fb10a581b1e962c26dfbbe261f2a