Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe
-
Size
584KB
-
MD5
8eeb282a68828c9689742dcb3a2fe057
-
SHA1
6c7e7a316dfcda2d9168ebe08947d0b2864254fa
-
SHA256
c2d380fe568c45811f2c12712c466d415d6d067865c6ba62f846570c61ff67b2
-
SHA512
274ef5f8535f21d53182293281a42255ca80571b665b38c55bda6f6e690aa46ea67c6ff01575a18986377e76523a4db61fcf1502810554101a6c6800be371ad8
-
SSDEEP
12288:L+3YCbVqpKIR6octd/0eITp23UJlZccgT3YcuEPH:L3a84octsTp7fZyT3v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2392 task.exe -
Loads dropped DLL 2 IoCs
pid Process 2584 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe 2584 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\cmd1.exe task.exe File opened for modification C:\WINDOWS\SysWOW64\cmd1.exe task.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\RCXB2AC.tmp 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\task.exe 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe File opened for modification C:\Program Files\Internet Explorer\task.exe 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language task.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2392 task.exe 2392 task.exe 2392 task.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2584 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe 2392 task.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2392 2584 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe 30 PID 2584 wrote to memory of 2392 2584 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe 30 PID 2584 wrote to memory of 2392 2584 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe 30 PID 2584 wrote to memory of 2392 2584 8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8eeb282a68828c9689742dcb3a2fe057_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files\Internet Explorer\task.exe"C:\Program Files\Internet Explorer\task.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
584KB
MD5683fea891a0513ce6333c87647c9211b
SHA188bd5763bf346e4f7793f1bc5c002e9918101ae2
SHA256de1d09b606130cf607da0ac6cdbddb432b3fabc0986a95cca1d71be2963c889b
SHA512a48214802588183d6c77703af61b7aeded14b8ebf7116b901a5035b7dad05c3414f3ced0148c93dee5a5e845dc98b8e68931031d8fc6a61fa4d417f7172e47b8