Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 15:15
Behavioral task
behavioral1
Sample
ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe
-
Size
314KB
-
MD5
ab839cd9bbb0a80314190aa0ca2cf1e3
-
SHA1
0baf8a1be5510f558f0919923f6cb399b4975659
-
SHA256
0b9fd0680cb5271c940981e41c295377f26dfacc62d64b249b9d37feddd2561f
-
SHA512
08790e95b9f407f2ee70ad98f26139542684c595e82bc775d0bfeb8d96296283ff9996d9b176434a494a84c32af1f80705def5b7eeb8b8161f0aeb7242a43f77
-
SSDEEP
6144:ElZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lpIka:EHLUMuiv9RgfSjAzRty6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 628 server.exe -
Loads dropped DLL 2 IoCs
pid Process 780 ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe 780 ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/780-0-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral1/memory/780-15-0x0000000000400000-0x00000000004B8000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/780-15-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 628 server.exe 628 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 780 wrote to memory of 628 780 ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe 31 PID 780 wrote to memory of 628 780 ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe 31 PID 780 wrote to memory of 628 780 ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe 31 PID 780 wrote to memory of 628 780 ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe 31 PID 628 wrote to memory of 1200 628 server.exe 21 PID 628 wrote to memory of 1200 628 server.exe 21 PID 628 wrote to memory of 1200 628 server.exe 21 PID 628 wrote to memory of 1200 628 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab839cd9bbb0a80314190aa0ca2cf1e3_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD54a2a83ef13c05d38c051f575f2a1cb7f
SHA1427e1ba55e6bd87947c392bacf66b97bb4cf607f
SHA256d6ba346256d7992c5658167d6d27a9fcd9abaece3629c21fe72364029bb4e0d6
SHA512ac56ac65f928cc18cca6201064d0ce754e8ac824c3c22ba86203c73b08e027907698d58430339f561ba1fe22615dde4fc105292451ee19615d196ece72980f88