Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
b12997e54107e2124c765bf401d58579_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b12997e54107e2124c765bf401d58579_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b12997e54107e2124c765bf401d58579_JaffaCakes118.exe
-
Size
390KB
-
MD5
b12997e54107e2124c765bf401d58579
-
SHA1
f84147beddf6bc93c731e50512dc7718ab485c5b
-
SHA256
a8a35f85fdbd51e9073623ffe6ee9464addd760a783729a98583c1d37c9cf5e5
-
SHA512
e9bb91c770bb803b738b8658fe96b5b206d13f2408e99b14606e7bf27c4e54cb6be63210fa35154b9a66620a3a85a6956915feea4de8f31b23e29a54780306e1
-
SSDEEP
12288:3plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:ZxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1792 integrate.exe -
Loads dropped DLL 2 IoCs
pid Process 1380 b12997e54107e2124c765bf401d58579_JaffaCakes118.exe 1380 b12997e54107e2124c765bf401d58579_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\boxes\integrate.exe b12997e54107e2124c765bf401d58579_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b12997e54107e2124c765bf401d58579_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language integrate.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1380 b12997e54107e2124c765bf401d58579_JaffaCakes118.exe 1380 b12997e54107e2124c765bf401d58579_JaffaCakes118.exe 1380 b12997e54107e2124c765bf401d58579_JaffaCakes118.exe 1380 b12997e54107e2124c765bf401d58579_JaffaCakes118.exe 1792 integrate.exe 1792 integrate.exe 1792 integrate.exe 1792 integrate.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1792 1380 b12997e54107e2124c765bf401d58579_JaffaCakes118.exe 30 PID 1380 wrote to memory of 1792 1380 b12997e54107e2124c765bf401d58579_JaffaCakes118.exe 30 PID 1380 wrote to memory of 1792 1380 b12997e54107e2124c765bf401d58579_JaffaCakes118.exe 30 PID 1380 wrote to memory of 1792 1380 b12997e54107e2124c765bf401d58579_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b12997e54107e2124c765bf401d58579_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b12997e54107e2124c765bf401d58579_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files\boxes\integrate.exe"C:\Program Files\boxes\integrate.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD58287fc7f9cdfb706c6517794d557cd81
SHA1fc39f318814bd9cfc74e0de3f9426a57041b3240
SHA2562b7e08d208b615de5c7c0e2aa07039fd94bba8c57295215ff50d9d3acdc24cf0
SHA5124f04a4a424b9bfa6ca7678db11802499fc3bd503821f8bf915634a0ca7ad90af75fc2ce959da5a6d061019d57d53dfbebae2dd65a492d9dbec56e17a1951c621