Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe
-
Size
321KB
-
MD5
a6e0a28a26c2e75c77a9a1619d41a7fc
-
SHA1
f5e8763b5aae4cb387c3b6716b4a6baad1304831
-
SHA256
d12594b0e7ec46809bb2f7dcca1689cc7cc2431267f2e8c9507a75f96d2c1455
-
SHA512
7d44739992d5aa089af187beb7288ea57b497d56c494a4baca21cdbba423e0cc44d4b535dad511ddbc1d06085faddd9abeab5b15d135e80800807475805ded62
-
SSDEEP
6144:TdVhzctJoYKS6/TJ80uIe1NF/5dVI4vYXbuleeehcJY1CZ/Hko8ZjJjsXPpPkYfE:TdctJM/TJXe1RLYrutehGZ/v6JAXhMYs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 oCfFeLo08504.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 oCfFeLo08504.exe -
resource yara_rule behavioral2/memory/2688-3-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/2688-1-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/2688-6-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/2688-5-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/2308-19-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/2688-23-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/2308-24-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/2308-37-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/2688-44-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\oCfFeLo08504 = "C:\\ProgramData\\oCfFeLo08504\\oCfFeLo08504.exe" oCfFeLo08504.exe -
Program crash 26 IoCs
pid pid_target Process procid_target 3028 2688 WerFault.exe 83 4436 2688 WerFault.exe 83 2336 2308 WerFault.exe 87 4916 2688 WerFault.exe 83 3732 2308 WerFault.exe 87 2592 2688 WerFault.exe 83 4204 2308 WerFault.exe 87 4836 2688 WerFault.exe 83 4516 2308 WerFault.exe 87 1208 2688 WerFault.exe 83 5020 2308 WerFault.exe 87 1528 2688 WerFault.exe 83 2128 2308 WerFault.exe 87 1348 2688 WerFault.exe 83 3632 2308 WerFault.exe 87 2092 2308 WerFault.exe 87 3524 2308 WerFault.exe 87 4204 2308 WerFault.exe 87 4248 2308 WerFault.exe 87 3428 2308 WerFault.exe 87 2924 2308 WerFault.exe 87 4656 2308 WerFault.exe 87 2856 2688 WerFault.exe 83 1044 2688 WerFault.exe 83 4520 2308 WerFault.exe 87 3760 2308 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oCfFeLo08504.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2688 a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe Token: SeDebugPrivilege 2308 oCfFeLo08504.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2308 oCfFeLo08504.exe 2308 oCfFeLo08504.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2308 oCfFeLo08504.exe 2308 oCfFeLo08504.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2308 oCfFeLo08504.exe 2308 oCfFeLo08504.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2308 2688 a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe 87 PID 2688 wrote to memory of 2308 2688 a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe 87 PID 2688 wrote to memory of 2308 2688 a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\ProgramData\oCfFeLo08504\oCfFeLo08504.exe"C:\ProgramData\oCfFeLo08504\oCfFeLo08504.exe" "C:\Users\Admin\AppData\Local\Temp\a6e0a28a26c2e75c77a9a1619d41a7fc_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 7563⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 7643⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 8083⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 8163⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 9763⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 10083⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 9683⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 13803⤵
- Program crash
PID:2092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 15923⤵
- Program crash
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 9243⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 6323⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 16683⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 17803⤵
- Program crash
PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 17883⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 6283⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 7803⤵
- Program crash
PID:3760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 6122⤵
- Program crash
PID:3028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 7802⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 7802⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 7802⤵
- Program crash
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 8122⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 9442⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 10162⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 11922⤵
- Program crash
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 6322⤵
- Program crash
PID:2856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 1362⤵
- Program crash
PID:1044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2688 -ip 26881⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2688 -ip 26881⤵PID:2204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2308 -ip 23081⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2688 -ip 26881⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2308 -ip 23081⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2688 -ip 26881⤵PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2308 -ip 23081⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2688 -ip 26881⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2308 -ip 23081⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2688 -ip 26881⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2308 -ip 23081⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2688 -ip 26881⤵PID:5024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2308 -ip 23081⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2688 -ip 26881⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2308 -ip 23081⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2308 -ip 23081⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2308 -ip 23081⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2308 -ip 23081⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2308 -ip 23081⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2308 -ip 23081⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2308 -ip 23081⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2308 -ip 23081⤵PID:2896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2688 -ip 26881⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 2688 -ip 26881⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 2308 -ip 23081⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 2308 -ip 23081⤵PID:1348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD598f2fcd57d1730654c68386afb20e369
SHA1cbca71768bec5b9c2a71a8d7b2e713973caba739
SHA2566f70af1a07a2967c7cd7fddb3034e1a47693df51a75b6a28c736f06591d11441
SHA5121b72d3e0f0c967452b77e40f20ac990603c8941f307d61d3cac5ea27eaff765e29d9f66aa8024d15e4fb0d0c8f5b9b4952cc8768164b31bbf91b9ec4c9a6e9f5