Analysis
-
max time kernel
127s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 05:18
Behavioral task
behavioral1
Sample
a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe
-
Size
11KB
-
MD5
a9bcf81c45194deeddeb8caa1da4ec4d
-
SHA1
2c9491d633ea56d44c50fbab3093730fc837d541
-
SHA256
9f7b0fec562dbe8fa2cda292ea5b2e91b9e2b37c2e79a935dbd4ce7acadb877a
-
SHA512
c5eb058bc41822767fde1abcf424167ad3caffd58eb7e639b373bd7f5da6bdfaf75890d5efa4e29e7dde3cbb62223ac94889b4017018b60cfffe37d6d3efb759
-
SSDEEP
192:zzbTfYLIGz6bOQ8CzuoPEJrV4goN5KhSUOa50Sg9l1CBN+A4ieHGV4Yd5E0n/IL0:P9RLRCrVRhuayhC7+A47GEeIL0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 588 cmd.exe -
resource yara_rule behavioral1/memory/2776-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2776-1-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2776-5-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2776-9-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2776-22-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2776 a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2844 2776 a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2844 2776 a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2844 2776 a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2844 2776 a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe 30 PID 2776 wrote to memory of 588 2776 a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe 32 PID 2776 wrote to memory of 588 2776 a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe 32 PID 2776 wrote to memory of 588 2776 a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe 32 PID 2776 wrote to memory of 588 2776 a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9bcf81c45194deeddeb8caa1da4ec4d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wewt0.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD55499b6b83f646f3c55d9a68b7ac20aa7
SHA1bc880b97b39f4f3fe79c2f59a85e650a816e03dd
SHA256f687958c3a207078bac144e5beb4d1d4ac62a9f3ae98bbc0e6dde1378a85d3e1
SHA51296015e7a11db3855f4ed1cfd847d7b685dedf8f90fb8136f9201b22a40a73d2c50da16b96dfc71cbe07d5915fbcf61ce6b205cdc9f2acb7da6baf5db4466b47e