Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe
-
Size
700KB
-
MD5
a91c0b1a63856e419d1f899ab20e3015
-
SHA1
d5461efec07edf1f33c9f0b40060a11d057243f1
-
SHA256
85b9933bd8318e5643da0fe1f27a802e3ea46358641341a85a4bef39e22843f9
-
SHA512
505682c930d25e39c66b09ea97a5bfa7c3bf77397885b82027515ecd5a718dfe6f74b37afb2b58143636a752b2d73565f4cc128f1ff8de06d8d7867048dbe3c5
-
SSDEEP
12288:/mgnpb1tiMrdNtfbtGcC93jhX35oV3cAJzpDqF3Z4mxx1DqVTVOCN:OUb1tiMrdHgcK3jhXpw3RtWQmXEVTzN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 10.exe -
Loads dropped DLL 6 IoCs
pid Process 1460 a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe 1460 a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe 3032 WerFault.exe 3032 WerFault.exe 3032 WerFault.exe 3032 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3032 2840 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2840 1460 a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe 30 PID 1460 wrote to memory of 2840 1460 a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe 30 PID 1460 wrote to memory of 2840 1460 a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe 30 PID 1460 wrote to memory of 2840 1460 a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe 30 PID 2840 wrote to memory of 3032 2840 10.exe 31 PID 2840 wrote to memory of 3032 2840 10.exe 31 PID 2840 wrote to memory of 3032 2840 10.exe 31 PID 2840 wrote to memory of 3032 2840 10.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 443⤵
- Loads dropped DLL
- Program crash
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD5082cec8162f276f92c476b8130e828f5
SHA1e909b3bc0cff6c6ec12aa0574f33c230ddabaa14
SHA25661c1425b4b72391ebac0654a826cb3387fcd09694040963f34264559c2dca9fd
SHA512a2f6f7c7d285d2f91728e66373b7ff8a6f16515388b33f6119298732ff0c88a1df16f7983ee8975fdd68ebab5291f63c82370454e98ce9c2dd15c853adde17bc