Analysis
-
max time kernel
8s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 06:10
Static task
static1
Behavioral task
behavioral1
Sample
a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
a178083977255560a5e3b886e4f79ce7
-
SHA1
9c59fec6a7d2559db0566ef5adc93740dcc67bad
-
SHA256
9da45c1414fde84e01fbe21e66ab691b1201aaa24c72f8575f5dec3f0fbd23b8
-
SHA512
1136f7e5bd5f062fe1249db4d8bddab33f848bb3c901bcde1cdf33f0f7761f104156e5799c64b4e65cf2235d404b1114a246faac5a811b992b222387f80942af
-
SSDEEP
49152:Dtq2uoGFcKkmE7BRCp4u3e3S5y1Shi35U0thsf:Dduo4cKkmISZe371SgJB4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1644 o4ib9o461wv8827.exe 812 4epu7913jyq24zg.exe -
Loads dropped DLL 3 IoCs
pid Process 1732 a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe 1644 o4ib9o461wv8827.exe 1644 o4ib9o461wv8827.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o4ib9o461wv8827.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4epu7913jyq24zg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 812 4epu7913jyq24zg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 812 4epu7913jyq24zg.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1644 1732 a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1644 1732 a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1644 1732 a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1644 1732 a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1644 1732 a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1644 1732 a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe 29 PID 1732 wrote to memory of 1644 1732 a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe 29 PID 1644 wrote to memory of 812 1644 o4ib9o461wv8827.exe 30 PID 1644 wrote to memory of 812 1644 o4ib9o461wv8827.exe 30 PID 1644 wrote to memory of 812 1644 o4ib9o461wv8827.exe 30 PID 1644 wrote to memory of 812 1644 o4ib9o461wv8827.exe 30 PID 1644 wrote to memory of 812 1644 o4ib9o461wv8827.exe 30 PID 1644 wrote to memory of 812 1644 o4ib9o461wv8827.exe 30 PID 1644 wrote to memory of 812 1644 o4ib9o461wv8827.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a178083977255560a5e3b886e4f79ce7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\o4ib9o461wv8827.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\o4ib9o461wv8827.exe" -e -p7yit6hq0c534ln62⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\4epu7913jyq24zg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\4epu7913jyq24zg.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD58c03b4dc54244014229009d42e7c0455
SHA18df39a19d4601daf554143815b6afa3286904a7d
SHA256012a675100f650f93436b0c226652b335db207b9ba04331d9d0513c975bb9010
SHA512bbd9573f14411dd23689e103e2ba75bfc89b481e540450ba47fd1550b088177efedd5918713ebab9776b89a57a82f28ba9784785fcc22fc86e180aeb70724d08
-
Filesize
1.9MB
MD5bfd99e635288e5e0f46f0e7aa150300c
SHA117b31bc6d8a5ca2c065fbaf3e1c755cf68ffd37b
SHA256969006837a0889f09181454819b7a27d89ca11330b628d3faf56a3e46022fd01
SHA512c806add828107536f463d3103be1907ddbe653a25fbf0e785dc69c2e9a52b76927a2d3efa6d509b85b97fa9710a3156273ee5c914f3365c5e854c6073da704cc