Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe
-
Size
14KB
-
MD5
8ef7a77e3251843d5c483b4079c21239
-
SHA1
35b9eb0f9edca1ad25b817ac9ea3466c79700b98
-
SHA256
82d30cbd2fa146dba047cc6db8621e6ca5e1c8458c8b38386e0d64674927bddc
-
SHA512
5e1285f687856ea8f5dd60ceaa5561bb0c510d1a161ed9857cc52b07a6ba2ddff94efde49d4827352c6790e99683068acd1eedc64e2a8db7cf79b0c3780885bc
-
SSDEEP
384:aS7e2bL8FmTZlnCZNsqd/rCHFuXybCMp9E5jrfSWoqXOXWP1KmWtgX:ayL8FmTZlC3fGSAEtrSWo1Ov
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\myowoflu.dll = "{71A78CD4-E470-4a18-8457-E0E0283DD507}" 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2908 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2312 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\myowoflu.tmp 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\myowoflu.nls 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe File created C:\Windows\SysWOW64\myowoflu.tmp 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507} 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32\ = "C:\\Windows\\SysWow64\\myowoflu.dll" 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32\ThreadingModel = "Apartment" 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2312 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe 2312 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2312 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe 2312 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe 2312 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2908 2312 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2908 2312 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2908 2312 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2908 2312 8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ef7a77e3251843d5c483b4079c21239_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\72C0.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5f8e69a836491e6cdc59f3c256f29e337
SHA104af7e9beddc5e775c7df720cb3f6fb0f5c85975
SHA256e873ccbc9a228a86fb6913a5c6f3f30dc2ecbbf76c016e00123380f3a13e55b4
SHA5125672da75a1dbd5e97bd2cd92438365c468b76f8d870c0aabe9f3be746342172c012f8bc22625117ea22b9e9e6441599dbaaa9630e666261cea555915fb876cf2
-
Filesize
428B
MD51d3759bf6bfcd56812d4c7a38fc230bd
SHA14ef68afd4bf5598e075cc604168f28706d4d2613
SHA256c72245140d07bfeb3f4fde9f11c8662d840fe1ea49f750b86041696f609c1e60
SHA512e2a46695431de487fbec0bb3c69c83d698f51422a8d3c015d57de81363e570869bfb7646b76b89df8657584476c844219fa838fae65525aaa0428620a5fb7dbe
-
Filesize
2.3MB
MD569d925dc748774a364b2f8386b19a4f2
SHA14651ca62d95ad5fde233df1c9cb4b2a434665b8a
SHA2569826bfb830300104c3aae87c73697766b81f4de4c42d1266576529eb38e5c019
SHA5122127f584fb361b0b91d7551bb7c13e775cb52736045766039835b01fb9f8f317b8afc0095cf4e54e8ba5d753c6eca0e7eb780c51d7e332215f7148930622e9c3