Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe
-
Size
99KB
-
MD5
a2617801dcc538daf32a840b74bbfa94
-
SHA1
3b33ad156291a465c849e70b7231068342d4ccaf
-
SHA256
ddafb17dd38eb20e54b727a1c17c659d6130ee14e8a3fa952f18c43f47a47cbf
-
SHA512
6b1d2596662d61ab451aa45f1aca6e8f5b34802bee334c2fc8b1a0ca5c87ff4804b36023efa27bceedfb973b634c5d961f9ecec9f9b07b227d7bf2a48faca396
-
SSDEEP
1536:lVq+QT183XZnxaK42eU9fhlR7zDefWpqFQJcNC0mevWxvm7ncgHcxKo9:JW+HyKJect7zDefpGc8C+RinX8xKo9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3976 intenat.exe -
Loads dropped DLL 2 IoCs
pid Process 3976 intenat.exe 3976 intenat.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\system32\\intenat.exe" a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\intenat.exe a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\intenat.exe a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe File created C:\Windows\SysWOW64\key.dll a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\key.dll a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe File created C:\Windows\SysWOW64\Deleteme.bat a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1744 3976 WerFault.exe 84 2884 3976 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intenat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4396 a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe 4396 a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4396 wrote to memory of 3976 4396 a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe 84 PID 4396 wrote to memory of 3976 4396 a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe 84 PID 4396 wrote to memory of 3976 4396 a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe 84 PID 4396 wrote to memory of 4960 4396 a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe 91 PID 4396 wrote to memory of 4960 4396 a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe 91 PID 4396 wrote to memory of 4960 4396 a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2617801dcc538daf32a840b74bbfa94_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\intenat.exeC:\Windows\system32\intenat.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 3803⤵
- Program crash
PID:1744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 5003⤵
- Program crash
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3976 -ip 39761⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3976 -ip 39761⤵PID:704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD53304d8fd05459371c460043cc5287f4d
SHA17fec4138b6ef26df569ea0d5665414f7e753d80d
SHA2567766a04241de4f883929e3d6f65b13cccf8cfe50546606e7370ff9aa3804eafd
SHA512a5fc94407423c72242b07373db6e54aecc67bad3f3d902d390fa6886f6964d2419d23a1e0338917318b8928860d71685da4bdc76b6b28ab3a3105c1a58ba4dcd
-
Filesize
99KB
MD5a2617801dcc538daf32a840b74bbfa94
SHA13b33ad156291a465c849e70b7231068342d4ccaf
SHA256ddafb17dd38eb20e54b727a1c17c659d6130ee14e8a3fa952f18c43f47a47cbf
SHA5126b1d2596662d61ab451aa45f1aca6e8f5b34802bee334c2fc8b1a0ca5c87ff4804b36023efa27bceedfb973b634c5d961f9ecec9f9b07b227d7bf2a48faca396
-
Filesize
43KB
MD562b93a4c9ace301a4d1b45ad6c234568
SHA1fe96bd64dd5c68c932b8dcabb1b8e49a4dcb65bb
SHA256b9148170439c13315a53863b131791993c09647206e7914b4cf4a6cae01f45b1
SHA512dc8bf4251b139de03e9026b4fd253aef97044c45b15911fcaeb14fe396f0f75870c831aadef60225c94ed521ea016011aebd0b2a6727f2f296e25aebb91d19c2