Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe
-
Size
228KB
-
MD5
a2d65aa920a0b46183500e8ac03dd888
-
SHA1
abfdf05f5732315ea4704fa345b956a49fb286cb
-
SHA256
6414f9993f90a81637935cfaa9643aa5f6c20df1cdd4bd6cbf2191ff3593b293
-
SHA512
7a36cae9e7e39775f4184172db5719aa1218c5c512ed81b2e8d3367b092a93e0b074648f490951e866b488dbbb7e57c0b3fd34699670e82133461135f6bcfc9b
-
SSDEEP
6144:J4lRkAehaKuqT+FjblnpYPWx5U418Lw+dlG:JkWAehJuqT0pYPi5ULdlG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1440 smss.exe -
Loads dropped DLL 4 IoCs
pid Process 2408 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 1272 WerFault.exe 1272 WerFault.exe 1272 WerFault.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\NetMeeting\netupdate.dll smss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1272 1440 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1440 2408 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 30 PID 2408 wrote to memory of 1440 2408 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 30 PID 2408 wrote to memory of 1440 2408 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 30 PID 2408 wrote to memory of 1440 2408 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 30 PID 2408 wrote to memory of 1440 2408 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 30 PID 2408 wrote to memory of 1440 2408 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 30 PID 2408 wrote to memory of 1440 2408 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 30 PID 1440 wrote to memory of 1272 1440 smss.exe 31 PID 1440 wrote to memory of 1272 1440 smss.exe 31 PID 1440 wrote to memory of 1272 1440 smss.exe 31 PID 1440 wrote to memory of 1272 1440 smss.exe 31 PID 1440 wrote to memory of 1272 1440 smss.exe 31 PID 1440 wrote to memory of 1272 1440 smss.exe 31 PID 1440 wrote to memory of 1272 1440 smss.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 2163⤵
- Loads dropped DLL
- Program crash
PID:1272
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD58a4eee88bbb0250b889cc4bca466edd5
SHA1163011e4516d273b5dc5a6161e83e2c1ff31a384
SHA256c9d9aceb927174fb00e367a00a6b604c85a6f028fe667e36dc54d9bd63266aba
SHA51222417c6f0303f180dca62b6d543ecba2ba347516ff956394bafe13d4ed004d1026c24c93828cda50ca909faf34436942e52c7c8473578c0ec0f1e516f96517ca
-
Filesize
58KB
MD58a6ea882564826b400284976a9455efc
SHA166723ae75ea688a91046208805f679aa8bb0ce31
SHA256932157b8abcb82016af7b38eec423a570c291eaaa79fa2464eba362796ae66e7
SHA512b9304a2ad05250000971e98117da8c173effa5f8673d7ad58dfa457669245e8f7bd94dfba744d02b1235573e7b09c019cf0824338b946cfe3fffcf4e337cf705