Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe
-
Size
92KB
-
MD5
aae1344a310138d40b45645b39ae25cc
-
SHA1
f9d99e621ae3c27f18e7202fc23bb1fa8ffa87a9
-
SHA256
246a7873b8f2a733e5c7ebaf348459868fa52830c8c4cdb3edb29d08a48a1248
-
SHA512
5c3a203bb018c741fcff4cea386fd846d15c141595bea1a7a751ed0b0aa8fd4e171de68ae7dc117b7e88d97483ea85420b1bf33db310e6a8fb61c9aee247f5d2
-
SSDEEP
1536:O5GJEhlcbW5sk19lfLvbeIbXWm+nwN6Jexs5gCSXCaWX3o6xjgPzj6pr9veEn:0Gu99lfzqIbXWm+w0JV5mSZX44jgPz8F
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3052 server.exe 1796 server.exe -
Loads dropped DLL 6 IoCs
pid Process 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 3052 server.exe 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 1796 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3052 server.exe 3052 server.exe 1796 server.exe 1796 server.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2056 wrote to memory of 3052 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 29 PID 2056 wrote to memory of 3052 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 29 PID 2056 wrote to memory of 3052 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 29 PID 2056 wrote to memory of 3052 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 29 PID 2056 wrote to memory of 3052 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 29 PID 2056 wrote to memory of 3052 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 29 PID 2056 wrote to memory of 3052 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 29 PID 3052 wrote to memory of 1208 3052 server.exe 20 PID 3052 wrote to memory of 1208 3052 server.exe 20 PID 3052 wrote to memory of 1208 3052 server.exe 20 PID 3052 wrote to memory of 1208 3052 server.exe 20 PID 2056 wrote to memory of 1796 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 30 PID 2056 wrote to memory of 1796 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 30 PID 2056 wrote to memory of 1796 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 30 PID 2056 wrote to memory of 1796 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 30 PID 2056 wrote to memory of 1796 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 30 PID 2056 wrote to memory of 1796 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 30 PID 2056 wrote to memory of 1796 2056 aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe 30 PID 1796 wrote to memory of 1208 1796 server.exe 20 PID 1796 wrote to memory of 1208 1796 server.exe 20 PID 1796 wrote to memory of 1208 1796 server.exe 20 PID 1796 wrote to memory of 1208 1796 server.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aae1344a310138d40b45645b39ae25cc_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5d788c8bcc1dd5319e271f46d2d383da2
SHA13f3d60c5c370940f47c047456a1c24aeaac6b3f0
SHA25679a1e0f6d7c1d958ac794fe240c499e2f5582d8d57d103e64258977c1a7fef58
SHA5124535c476283967fc38b4c19cdb2961ba1eff96ace7c0d1eb8fe2f64ab7ae99bbce8f72ebfefcc8aa7c7508a06e341145c9889356f9c201a1592b2111d2627d41