Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe
-
Size
123KB
-
MD5
a0ab970a1bb1b6b94ec02cfa8b7f2c4f
-
SHA1
2da435364f04be5956b20b37a65ef5c3dc041f4b
-
SHA256
468a62e34708d2d6a507a9f250a7947097a96c27113448c8dffcba8bc1f8733b
-
SHA512
7b60c80ccc668224c5492b824fee846e885cef134074c8af7b122d079ba1d8ed7b81dafded81c01e09fa22ac0a3c035dc3344ed1c7d81a1a492d5a6bcebb99fb
-
SSDEEP
3072:STAYF+lR7g62l6KzaJ9BIOWT/iJaH7Ph6+gKRIXmdDI+3c:OAYA7gQB1WCK7PGybc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2752 1.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\1.exe a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2764 2752 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2884 a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2752 2884 a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe 30 PID 2884 wrote to memory of 2752 2884 a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe 30 PID 2884 wrote to memory of 2752 2884 a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe 30 PID 2884 wrote to memory of 2752 2884 a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2764 2752 1.exe 31 PID 2752 wrote to memory of 2764 2752 1.exe 31 PID 2752 wrote to memory of 2764 2752 1.exe 31 PID 2752 wrote to memory of 2764 2752 1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0ab970a1bb1b6b94ec02cfa8b7f2c4f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\1.exe"C:\Windows\1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 363⤵
- Program crash
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD53360dc110eab4d9b98316ed4dd81735c
SHA135249b8eb6f71bbf1608400d9468e5cafcf0c3b8
SHA256d568d75a803f6e10abe9b1daca7c999c11f95cef38ba29b7f3cee6f603efd51b
SHA512d08e61639e99cbb45739e0ccb5f7257715cae015e4a48d87df73642f41baf48f49ca2f41419ff76273503de89dde2e8b0d3998e0cfb0e03d3a02b42c6b0bd97f