Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe
-
Size
322KB
-
MD5
a9791159c5f31a893679a99b0cc6d14a
-
SHA1
18047c75332e1dd8d7fa6b2725335b0a0b864f03
-
SHA256
45054258a3f84036e54ad21b287a974a863def6637d5e739f996b12560225dc3
-
SHA512
92057cc971059df3c96ae77d70a27a1368f506b182618a8df9a720ad99a61489e528c79f63d880ee16858c58bbd017b9ebe7cbaaf1be3ad5fee29f709e6b3fe1
-
SSDEEP
6144:sl6A9EpKroUuHH70fV+QM6GgoZW93x678qe7PhkIOeVdHw0aNPsl5:q9EyBu70fRM9DWVRp7PhfdHuNPs/
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2728 Torchsoft Malware Defender v2 0 5 Incl Keygen and.Pa tch-BRD.exe 2908 7za.exe 2652 ic1.exe -
Loads dropped DLL 10 IoCs
pid Process 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 2728 Torchsoft Malware Defender v2 0 5 Incl Keygen and.Pa tch-BRD.exe 2728 Torchsoft Malware Defender v2 0 5 Incl Keygen and.Pa tch-BRD.exe 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 2908 7za.exe 2908 7za.exe 2908 7za.exe 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Torchsoft Malware Defender v2 0 5 Incl Keygen and.Pa tch-BRD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main Torchsoft Malware Defender v2 0 5 Incl Keygen and.Pa tch-BRD.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 Torchsoft Malware Defender v2 0 5 Incl Keygen and.Pa tch-BRD.exe 2728 Torchsoft Malware Defender v2 0 5 Incl Keygen and.Pa tch-BRD.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2728 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2728 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2728 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2728 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2728 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2728 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2728 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2908 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2908 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2908 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2908 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2908 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2908 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2908 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2652 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2652 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2652 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2652 2520 a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9791159c5f31a893679a99b0cc6d14a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Torchsoft Malware Defender v2 0 5 Incl Keygen and.Pa tch-BRD.exe"C:\Users\Admin\AppData\Local\Temp\Torchsoft Malware Defender v2 0 5 Incl Keygen and.Pa tch-BRD.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\7za.exeC:\Users\Admin\AppData\Local\Temp\7za.exe x C:\Users\Admin\AppData\Local\Temp\a1.7z -aoa -oC:\Users\Admin\AppData\Local\Temp -plolmilf2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\ic1.exe"C:\Users\Admin\AppData\Local\Temp\ic1.exe"2⤵
- Executes dropped EXE
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5fe1a3c6046eaa4de86b2f37d5d5d9fec
SHA1254d7411106436e9c583b21fb3aabd11665b4ad2
SHA256760db114cd6711fd8c5df7f0ddc7e0b641c8c585dbe199b4a316e726ed390c11
SHA5121ad719b52a294441c101e1d40babc8dd4ea0d39286d93d3047d024a1590f8e48ccff556bea5469eb1713294b04760ee656f627d4876a9cdf657eadf87a00b0fc
-
Filesize
18KB
MD5b64b538899d4588a05d7d3db92918448
SHA1b2d0b29a9c69bac6b22f696474eb031cca664f9a
SHA256803abec016d53636f2817c972f2c769beb36501fc8bd30c73994958eb94cfb29
SHA512ba4732c7a25dfdd636009a5ec8597e233c7c2b736b9c08a07dce13de70d9e0e08652b7f323ab590a29b57da12bf6a347675b2103bdfef06a80dbfd555ad09727
-
Filesize
523KB
MD5e92604e043f51c604b6d1ac3bcd3a202
SHA14154dda4a1e2a5ed14303dc3d36f448953ff6d33
SHA256fa252e501332b7486a972e7e471cf6915daa681af35c6aa102213921093eb2a3
SHA512ef396d94d83fd7a588c6e645ea5fcfe24390440a03b3bf0ecd05ca6749fd3f9561dfafe725ee0edea51a34d52af26cd311e768aa72f75686cc796abee4757d43
-
Filesize
90KB
MD5c647ab2b595610bcbfc5a8cd14e67d1e
SHA1471da010a50c5efc6d5fd9f61bd1970facca65fe
SHA256ce294b615bd1a8d8c57705d5aaff9add06584cd741a600829a3a1620a4631f89
SHA5122ddaf91142c07126330b7c13137ae47fdf5db890ec3a7834c8f624e764017a56615cc4b442c1adbe99213781e154969936b4aa0ed44c680dfa233618cb8b0813
-
Filesize
5KB
MD5a7cd6206240484c8436c66afb12bdfbf
SHA10bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919
SHA25669ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926
SHA512b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904