Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
971490c4973d3fe52567483995bcd7ac_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
971490c4973d3fe52567483995bcd7ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
971490c4973d3fe52567483995bcd7ac_JaffaCakes118.exe
-
Size
192KB
-
MD5
971490c4973d3fe52567483995bcd7ac
-
SHA1
96dfebb1d9ed3e95df1073cab4b833dcc567c393
-
SHA256
01abaab1f570e3fd5e0cffbaf9afab38543515b740460ba6c8034461798198c2
-
SHA512
1b0afac3b03044792ece5cc740f00b7efd6bc77c37f8d508723ad7758b2b6ae1ebdeb87f39862880ed287933e22479d983e366a6cd4fc3b8aa0583003a51e9c1
-
SSDEEP
3072:eT60OvTrQj4hWvJnEIn8ikxwNMxvSj7uNmfYdOTsuZfD:NXOnn86MxQuNywuZr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 ozzbxu.exe -
Loads dropped DLL 2 IoCs
pid Process 2660 cmd.exe 2660 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 971490c4973d3fe52567483995bcd7ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ozzbxu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3000 PING.EXE -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell ozzbxu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID ozzbxu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} ozzbxu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\aozzb\\command ozzbxu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node ozzbxu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\aozzb ozzbxu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\aozzb ozzbxu.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3000 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2660 2604 971490c4973d3fe52567483995bcd7ac_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2660 2604 971490c4973d3fe52567483995bcd7ac_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2660 2604 971490c4973d3fe52567483995bcd7ac_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2660 2604 971490c4973d3fe52567483995bcd7ac_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2844 2660 cmd.exe 32 PID 2660 wrote to memory of 2844 2660 cmd.exe 32 PID 2660 wrote to memory of 2844 2660 cmd.exe 32 PID 2660 wrote to memory of 2844 2660 cmd.exe 32 PID 2660 wrote to memory of 3000 2660 cmd.exe 33 PID 2660 wrote to memory of 3000 2660 cmd.exe 33 PID 2660 wrote to memory of 3000 2660 cmd.exe 33 PID 2660 wrote to memory of 3000 2660 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\971490c4973d3fe52567483995bcd7ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\971490c4973d3fe52567483995bcd7ac_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ribcrmx.bat2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\ozzbxu.exe"C:\Users\Admin\AppData\Local\Temp\ozzbxu.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2844
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD58f6d76d13baf25f5e28dc1076ca09104
SHA120aaffa6e6e774645887d9762b3d2e161bf49837
SHA256ddaf030b338b212ce06e3c44e0f916e1752c53a3803851101b503fa57f8b7289
SHA5126287e5d971283d8924cab737d26d6469b063fa136f842e24917b34dd44df59197c6f5e76c8e1aca18370f97ef06ba8344fce93af76e1cf6c07da06a8dd989503
-
Filesize
124B
MD5732ae43af8cf141289f9c4929fd4fd55
SHA1d61473aafdd84eb3d9964dc0bb27b8cbbd9a3fed
SHA256892cfc3b5669b8393e95294043345277b4643a43ebbcf9a52882999c95591616
SHA512ec4d5659698bd71339dae32a8bc1cb351abcc3f9d7e1b4d8e2331f93fcb4a8cc74538f3bfc67a6ff06b52cab2e8089b3566c767394d8142175add2dad801b38a
-
Filesize
170B
MD5023127e474fbff4f19d9960b21a04ee1
SHA1253f0b8e72ddbb4a7956678eaf57195e3302cdaf
SHA25646aeb47dd800b52b21dc83cc5f9e1d91259f8856533e1f262d200564c3592dd0
SHA5126600103363b3901a5ee3b5e69b95961bfa6f897ff8527dd400bb9d11c48a2cc1140867b4d06602098f3a72d24731b84499cfcffa82cabcb3540fef7f5d7fc341