Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 23:03
Behavioral task
behavioral1
Sample
a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe
-
Size
46KB
-
MD5
a049b823e2fa87f782e388d94ed31261
-
SHA1
ba2a80ae8941487f34fed974fa4ed13d9b0663cb
-
SHA256
2232fe1fe3a10cad1143e6adf16f857f26af8274eb28b75199e78f75715fc23c
-
SHA512
127ba81dba0ddfb798ce3465bc1f7e9497e5c8a5076b118c3b79b2b718cd917093269cb522174fe5775916258a05a83db723dfa9dce8ba0b26f5201d1b808676
-
SSDEEP
768:2aAF8sLmG5SaRosRYDGkxmplN3qUrB7sXlzMWEjF3bi3hfYpO:2am8sLmdxmHZqosXBXEjF3bi3hfYpO
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\host7 a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2888 cmd.exe -
resource yara_rule behavioral1/memory/1604-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\lsiss.sys a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe File created C:\Windows\sdel.bat a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1604 a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2888 1604 a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe 28 PID 1604 wrote to memory of 2888 1604 a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe 28 PID 1604 wrote to memory of 2888 1604 a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe 28 PID 1604 wrote to memory of 2888 1604 a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\sdel.bat" "C:\Users\Admin\AppData\Local\Temp\a049b823e2fa87f782e388d94ed31261_JaffaCakes118.exe""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87B
MD5c422f73e563f284c81c1a23aff9e3d57
SHA140a866138213d046c7982e2eef29349457ba0d76
SHA256735faf8fc874f00472cbb0abc08cb86390d44c737e77558c2b93bfeefc2c4d16
SHA512355fab1efd9f78ee8f8f9260c80634493fc7b4b2fcefa71bcb938ec89cb788b52ad2ffe3a24d0aa18af00db29102d365859c0635524ebc87638bda3f05b8444a