Analysis
-
max time kernel
84s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe
-
Size
64KB
-
MD5
aaa7c047d56d230fe131a5a20bbf99ee
-
SHA1
f39207eccbce529af87f5362cec91984daaf995a
-
SHA256
520c03e80c7ab61a07a634edc8317e44e95c20a73417d83a6c9b0ce9e61d0c6a
-
SHA512
69473c7115c59917cc8de6da1f446519ec87a4e0c03c2ac90080cf0f32dc9e2d2f70a622abd8e5bfee3171cc758d511b9c1a8af47f42c6ebc99892e1d1b12056
-
SSDEEP
768:IdFtFBQdVzTAI319fmgDbTIpKd9als2OACyVuSEjFZCOxvREKxfhe1bAdtOwdrZt:AFmfAufbTIAYOANMFjkmdtOwJZcsp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2880 server.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\server.exe aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2880 server.exe 2880 server.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2880 2116 aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2880 2116 aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2880 2116 aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2880 2116 aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe 29 PID 2880 wrote to memory of 1196 2880 server.exe 20 PID 2880 wrote to memory of 1196 2880 server.exe 20 PID 2880 wrote to memory of 1196 2880 server.exe 20 PID 2880 wrote to memory of 1196 2880 server.exe 20 PID 2880 wrote to memory of 1196 2880 server.exe 20 PID 2880 wrote to memory of 1196 2880 server.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aaa7c047d56d230fe131a5a20bbf99ee_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\server.exe"C:\Windows\server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5aaec1b05c41acffe6b90455e2048f4c7
SHA104afa22dd226946ba7873c634b9d542d33df5568
SHA2566515d6cb7cae76bd77d80dac45946a458960d5596ff898fa5adda56f92e08e00
SHA512bb9a2a047b82b29fa69c3adb52ecd601652052651ba164403ef3bcc13ce376874a1d8215bcf69d41d7eb32ec3ca55c224d90dc691528379f613545c30ea18bfa