Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 00:18
Behavioral task
behavioral1
Sample
ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe
-
Size
3.1MB
-
MD5
ad2b65a082dd6d35b78f31c387a6463d
-
SHA1
1e9e3aee17fa919f77d5683456272f06bb6b3afd
-
SHA256
bec04840d5ea2fb9416c10af900d4b14fa2f5e59cf65fbb3945e7c8ba349dfb9
-
SHA512
bdee1a1d0df25795de6677da2340960aa4109a53258adcaf955d0dee61bf08001efa9607fcecb953575ef29418fc7192a15a50d3feabd0c5b5274a45fda42e81
-
SSDEEP
98304:Xn2ea7dRlYKcakVNGQV5caktQj/8qw+Hz0ucakVNGQV5cakD:Xn2bdR6Kd2V5dLD8dEdd2V5dM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2292 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2292-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000c000000016d28-11.dat upx behavioral1/memory/2292-16-0x0000000023500000-0x000000002375C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2292 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2292 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1436 2292 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 31 PID 2292 wrote to memory of 1436 2292 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 31 PID 2292 wrote to memory of 1436 2292 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 31 PID 2292 wrote to memory of 1436 2292 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 31 PID 1436 wrote to memory of 2728 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 32 PID 1436 wrote to memory of 2728 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 32 PID 1436 wrote to memory of 2728 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 32 PID 1436 wrote to memory of 2728 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 32 PID 1436 wrote to memory of 2792 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 34 PID 1436 wrote to memory of 2792 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 34 PID 1436 wrote to memory of 2792 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 34 PID 1436 wrote to memory of 2792 1436 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2932 2792 cmd.exe 36 PID 2792 wrote to memory of 2932 2792 cmd.exe 36 PID 2792 wrote to memory of 2932 2792 cmd.exe 36 PID 2792 wrote to memory of 2932 2792 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe" /TN 311UZRRNcb76 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 311UZRRNcb76 > C:\Users\Admin\AppData\Local\Temp\prk03J1.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 311UZRRNcb764⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fc992913de1387931b1746bb49e948d4
SHA1dc5161d08cf123f60dfbed8e16c83d18eb41ef66
SHA2565146479c01115cc2c99f4ea1c22ab3ffc7fc90f62a668437a13d33663c7b2608
SHA5125952ed46b223c312f915758e90fdf78b939654e82f481cf34db1cf88f9d685bd1c5905cefa328a361d90140d58adc1674f6a3074fa91b462fff57612b7f085cf
-
Filesize
3.1MB
MD579609ed8d6d8b515a69624ba059d168f
SHA122b1055f6abb18a8947fd079a64f67c3b7fd7f8e
SHA25632785fe6bbddb6253f2b5f64ba97a2157d9c4ae04d43feea6964202c3373d80e
SHA512b327ede89d85d2076fa559d5077328399769183a8df0746658b8f480a43c38552898ab9e5931e23e363c133b32b05921bdd1bedc7146557580558d0c02ded7e3