Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe
-
Size
126KB
-
MD5
ace2a1dcca2058a6830e5565f9006683
-
SHA1
5b7e1cae98d379bc13a409475652011533077e40
-
SHA256
385ee32797fcbc3a9abae37434de6816a11e8c4e48b53d361715407d8a8ca921
-
SHA512
80689098e327b0870047c8eeeff5aa1379d293d3d208a0ee583827ba0b68a2447967a7a076ac3aca81f641d19cb16d4d3875c3ed9a3613772af50d45a4c7e62a
-
SSDEEP
3072:mRBmaB0l/61sTydxZQEomqBILTgt5I0cBo:mTwydrYDygrcBo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2284 rb.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rb.exe ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2304 2284 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2148 ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2284 2148 ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2284 2148 ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2284 2148 ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2284 2148 ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe 31 PID 2284 wrote to memory of 2304 2284 rb.exe 32 PID 2284 wrote to memory of 2304 2284 rb.exe 32 PID 2284 wrote to memory of 2304 2284 rb.exe 32 PID 2284 wrote to memory of 2304 2284 rb.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ace2a1dcca2058a6830e5565f9006683_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\rb.exe"C:\Windows\rb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 443⤵
- Program crash
PID:2304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD5fdce8fd194b481f368d79a676cd9af1a
SHA1c27b9f0c0ae923e475e7c71125ccb0e5c87eb6e4
SHA25608d1ee6bd88d93db92589d82a016c59eddd3ba8df2fa14d0af4e07116a705fee
SHA51290fdc8667ed7bef1d06def67e4419c67ef178b55761184ff59aa51f0babd62a2418c939a9eda9a210b7292a3a0594a54a17b0e5b3e5d35e83a476def53f83c25