Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe
-
Size
63KB
-
MD5
a557de82fdad4cc4843ec47f0d634f42
-
SHA1
5a99193e805d721d8c44defd5400f32bbf953589
-
SHA256
346d7b5529da0259174fa23b7dab626c3c61852e0d177048f8806a6e5f4f1902
-
SHA512
1469ee3f321b02702ac94f7cb799e40cdd471611cbc85d18fec045384d50d34fccfbbde94c7d015c2119c4111e1e9bc91a950df7b530b9941eb7107400e6125b
-
SSDEEP
768:pLg70B0Xz+M0pb5wXuqAR1Y+u4FxgxunyhmL+WPi0H1iUYstg7Q1TTGfL:pLg70KuqHH4jZHUhPQ1E
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2420 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2704 a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe 2704 a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-08\bin\jusched.exe a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-08\bin\UF a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2420 2704 a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2420 2704 a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2420 2704 a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2420 2704 a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5a557de82fdad4cc4843ec47f0d634f42
SHA15a99193e805d721d8c44defd5400f32bbf953589
SHA256346d7b5529da0259174fa23b7dab626c3c61852e0d177048f8806a6e5f4f1902
SHA5121469ee3f321b02702ac94f7cb799e40cdd471611cbc85d18fec045384d50d34fccfbbde94c7d015c2119c4111e1e9bc91a950df7b530b9941eb7107400e6125b