Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 22:58
Behavioral task
behavioral1
Sample
a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe
-
Size
16KB
-
MD5
a47b787a42c886785fb2e232af09fa09
-
SHA1
1902a8660ceb274ee4ff87dd07e14b2ce474f79a
-
SHA256
dfa0d8e3f525c8c5ef6caf3da3a0c7496aa4c0b1fbe163aa2d11a321230491a0
-
SHA512
20d455690a6fd91a1afc331a3a569cbb8318b6f8e4edd51b6863e9b8d2d4a24ff1e6859319e213d7f0be65ad1f11048520c5d5eb322ec487da1bc10e40418a8b
-
SSDEEP
384:z93OPkSyyNmFfR0K9erK7Xo1WQEFlAtSeaJAO9FGy:z93ukJyNmFfFeoY1WQEF2Da+MF
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 2808 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2152 lenyunsk.exe -
Loads dropped DLL 2 IoCs
pid Process 2412 a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe 2412 a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2412-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x0008000000018d89-3.dat upx behavioral1/memory/2412-11-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2152-14-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\lenyuns.dll a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe File created C:\Windows\SysWOW64\lenyunsk.exe a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lenyunsk.exe a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2152 2412 a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2152 2412 a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2152 2412 a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2152 2412 a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2808 2412 a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe 32 PID 2412 wrote to memory of 2808 2412 a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe 32 PID 2412 wrote to memory of 2808 2412 a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe 32 PID 2412 wrote to memory of 2808 2412 a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\lenyunsk.exeC:\Windows\system32\lenyunsk.exe ˜‰2⤵
- Executes dropped EXE
PID:2152
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a47b787a42c886785fb2e232af09fa09_JaffaCakes118.exe.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5660dfe5890db408df8fc01445c01ec71
SHA1439a8b8fd7662a48597dacb8f4a4adc085f375ee
SHA256e7ff0ae5d24011f4957237a42df6a638fd1770de8031d27d39d489c2091f8d0e
SHA512225cf266c733fc10667bfa0aebfc56bdb4673c0bcdfc3fc9d89483ab334575c4b8cc6f0ff9014c5032c5a48acfa1bc115585d776eedb9001c478aaf2b9372940
-
Filesize
16KB
MD5a47b787a42c886785fb2e232af09fa09
SHA11902a8660ceb274ee4ff87dd07e14b2ce474f79a
SHA256dfa0d8e3f525c8c5ef6caf3da3a0c7496aa4c0b1fbe163aa2d11a321230491a0
SHA51220d455690a6fd91a1afc331a3a569cbb8318b6f8e4edd51b6863e9b8d2d4a24ff1e6859319e213d7f0be65ad1f11048520c5d5eb322ec487da1bc10e40418a8b