Analysis
-
max time kernel
126s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 22:52
Behavioral task
behavioral1
Sample
a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
a4763d9e1d3b626ac8218db65e8cfc1f
-
SHA1
ef14ceea420c25c6049f6a0edff1db46e6145f0e
-
SHA256
e424cee0ee397e0462f5e7ee05477768f9feda1752c3eb345515c19b7113b35a
-
SHA512
54d2088b8593c54f658aab9e014136225ed0e0acf2fba6df80d7d47cb37a598f6e8ee45ab3c169aced29f556c0db16e44e37593f8628ff3dd910e7f0e49bf96d
-
SSDEEP
24576:k4N6A5D9klJ33umrb0nBtsGTj9CFK/fkfOQdUPsz7X+dd+7hm4tsDM9JRMo5:k489J33LrQBN9TfuUUzsz4tsI9U
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/828-3-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/828-7-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-20-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-38-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-42-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-40-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-39-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-37-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-35-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-33-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-32-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-31-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-30-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-29-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-28-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-26-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-36-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-34-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/828-25-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-27-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-23-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-21-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-19-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-24-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-18-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-17-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-16-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-13-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-22-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/828-8-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/828-5-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/828-4-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-41-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-44-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-46-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-50-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-49-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-48-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-47-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-51-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-45-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/memory/2828-75-0x0000000000400000-0x00000000006FD000-memory.dmp themida behavioral1/files/0x00050000000186b7-77.dat themida behavioral1/memory/2828-78-0x0000000000400000-0x00000000006FD000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\QfvvcdC = "c:\\ProgramData\\PrdjerH\\PjkqicI\\QfvvcdC.exe" notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 828 set thread context of 2828 828 a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 828 a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe 2828 notepad.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 828 wrote to memory of 2828 828 a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe 30 PID 828 wrote to memory of 2828 828 a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe 30 PID 828 wrote to memory of 2828 828 a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe 30 PID 828 wrote to memory of 2828 828 a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe 30 PID 828 wrote to memory of 2828 828 a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe 30 PID 828 wrote to memory of 2828 828 a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a4763d9e1d3b626ac8218db65e8cfc1f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5a4763d9e1d3b626ac8218db65e8cfc1f
SHA1ef14ceea420c25c6049f6a0edff1db46e6145f0e
SHA256e424cee0ee397e0462f5e7ee05477768f9feda1752c3eb345515c19b7113b35a
SHA51254d2088b8593c54f658aab9e014136225ed0e0acf2fba6df80d7d47cb37a598f6e8ee45ab3c169aced29f556c0db16e44e37593f8628ff3dd910e7f0e49bf96d