Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe
-
Size
135KB
-
MD5
aa1b908b00254f7ed9b55b3a517b7e46
-
SHA1
853922e63ececca0fa5ebccbb078cdeca101d6b3
-
SHA256
bb1ae5292dda08b25e46019710e48e74796e9085916a5768045703548d20c87b
-
SHA512
fa283286adb7e7e021c836896d43efcc2561b54dd7838b373f7ddfbf8575073c68430c2cdcb88444393ae1823b7995eaa928241fd7fa6e45d6ed93b786c6a57e
-
SSDEEP
3072:Rr+pMQQfahmYP3fzo3qYQ0VPQRDMgfXXjnKK+pnq8f5rRpBdBanOout:RrKuSmaSxVPQDM4nzKKCnq8fTdBaOoS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2756 proxysvc32.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 proxysvc32.exe -
Loads dropped DLL 2 IoCs
pid Process 672 aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe 672 aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\proxysvc32.exe aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\proxysvc32.exe proxysvc32.exe File created C:\Windows\SysWOW64\proxysvc32.exe proxysvc32.exe File created C:\Windows\SysWOW64\proxysvc32.exe aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language proxysvc32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 672 wrote to memory of 2756 672 aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe 30 PID 672 wrote to memory of 2756 672 aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe 30 PID 672 wrote to memory of 2756 672 aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe 30 PID 672 wrote to memory of 2756 672 aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe 30 PID 2756 wrote to memory of 2840 2756 proxysvc32.exe 31 PID 2756 wrote to memory of 2840 2756 proxysvc32.exe 31 PID 2756 wrote to memory of 2840 2756 proxysvc32.exe 31 PID 2756 wrote to memory of 2840 2756 proxysvc32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\proxysvc32.exeC:\Windows\system32\proxysvc32.exe 484 "C:\Users\Admin\AppData\Local\Temp\aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat C:\Windows\SysWOW64\proxysvc32.exe3⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD5bfcf9cc6d1c37953dfa43312e2c36140
SHA107a4c0f29b282c34be24c312c4b920e479f4cee0
SHA256bac7cce52aeba3a2e2ce2bb6aebf50ffa65530d0d51ca49a2abc7f4e43ce3ce5
SHA512fb661474557e7168d4050607863b57649fa12a26ab9bd06078ae3254d003d76cfed4eac3d0a78a56eaf0ecc5b231d52788b6c8688cb14b0c86a37efe90f5f53a
-
Filesize
135KB
MD5aa1b908b00254f7ed9b55b3a517b7e46
SHA1853922e63ececca0fa5ebccbb078cdeca101d6b3
SHA256bb1ae5292dda08b25e46019710e48e74796e9085916a5768045703548d20c87b
SHA512fa283286adb7e7e021c836896d43efcc2561b54dd7838b373f7ddfbf8575073c68430c2cdcb88444393ae1823b7995eaa928241fd7fa6e45d6ed93b786c6a57e