Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe
-
Size
632KB
-
MD5
aa751e4b92849f1d414f5f7f64f5a59f
-
SHA1
f53a62041325d879ce7af1b22cb171705dc199ed
-
SHA256
c7575d40c5252f9f16a44f231152999117f3c7e244e34000fad0ef6decc7e45f
-
SHA512
d6a4d9286679c78e6b80f66a6845e8b7f5ee5beeae4a61f9dc45fae4cc019f6cda737b70f77a27471cbdd038977e2fb1aafa7061b5f676fb9d324e99ed330221
-
SSDEEP
12288:1EC7Fj+6cP3vsJjLLaUfO99BzSl9NUF3Z4mxxN0sFEaWjYbJFE2LF:+C7Fq6mcLaUHUQmXdE9js2C
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2796 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2784 systen.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ieapfltr.dat aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe File created C:\Windows\SysWOW64\systen.exe aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\systen.exe aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ieapfltr.dat systen.exe File opened for modification C:\Windows\SysWOW64\systen.exe systen.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\RAV2007.BAT aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2796 2104 aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2796 2104 aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2796 2104 aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2796 2104 aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa751e4b92849f1d414f5f7f64f5a59f_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\RAV2007.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\systen.exeC:\Windows\SysWOW64\systen.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD51af767fb2ede8888414670540740e00d
SHA183b3278ce3bb6ee54085428e6f986fa5c528109c
SHA2569ebb2ec0431c022909a48adebd6c5567cc305ca99c6885f55db7d3ab0a1d7a59
SHA512f9727a164131168c396ec750df1808abaa528bbf151860597ebda8e7a6e8a1ae0337d9e2e2fd5a8afd6891aa1c045234f77c6c3240b0e953f5f00b43c2ea41b9
-
Filesize
632KB
MD5aa751e4b92849f1d414f5f7f64f5a59f
SHA1f53a62041325d879ce7af1b22cb171705dc199ed
SHA256c7575d40c5252f9f16a44f231152999117f3c7e244e34000fad0ef6decc7e45f
SHA512d6a4d9286679c78e6b80f66a6845e8b7f5ee5beeae4a61f9dc45fae4cc019f6cda737b70f77a27471cbdd038977e2fb1aafa7061b5f676fb9d324e99ed330221