Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 00:18
Behavioral task
behavioral1
Sample
ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe
-
Size
3.1MB
-
MD5
ad2b65a082dd6d35b78f31c387a6463d
-
SHA1
1e9e3aee17fa919f77d5683456272f06bb6b3afd
-
SHA256
bec04840d5ea2fb9416c10af900d4b14fa2f5e59cf65fbb3945e7c8ba349dfb9
-
SHA512
bdee1a1d0df25795de6677da2340960aa4109a53258adcaf955d0dee61bf08001efa9607fcecb953575ef29418fc7192a15a50d3feabd0c5b5274a45fda42e81
-
SSDEEP
98304:Xn2ea7dRlYKcakVNGQV5caktQj/8qw+Hz0ucakVNGQV5cakD:Xn2bdR6Kd2V5dLD8dEdd2V5dM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1148 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1148 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1540-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x000900000002362a-12.dat upx behavioral2/memory/1148-14-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 19 pastebin.com -
Program crash 19 IoCs
pid pid_target Process procid_target 1756 1148 WerFault.exe 92 676 1148 WerFault.exe 92 3168 1148 WerFault.exe 92 2596 1148 WerFault.exe 92 100 1148 WerFault.exe 92 2796 1148 WerFault.exe 92 1772 1148 WerFault.exe 92 4408 1148 WerFault.exe 92 3324 1148 WerFault.exe 92 3492 1148 WerFault.exe 92 1604 1148 WerFault.exe 92 1164 1148 WerFault.exe 92 2420 1148 WerFault.exe 92 3224 1148 WerFault.exe 92 5104 1148 WerFault.exe 92 2352 1148 WerFault.exe 92 4860 1148 WerFault.exe 92 4316 1148 WerFault.exe 92 180 1148 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1692 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1540 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1540 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 1148 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1148 1540 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 92 PID 1540 wrote to memory of 1148 1540 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 92 PID 1540 wrote to memory of 1148 1540 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 92 PID 1148 wrote to memory of 1692 1148 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 93 PID 1148 wrote to memory of 1692 1148 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 93 PID 1148 wrote to memory of 1692 1148 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 93 PID 1148 wrote to memory of 4764 1148 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 95 PID 1148 wrote to memory of 4764 1148 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 95 PID 1148 wrote to memory of 4764 1148 ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe 95 PID 4764 wrote to memory of 3084 4764 cmd.exe 97 PID 4764 wrote to memory of 3084 4764 cmd.exe 97 PID 4764 wrote to memory of 3084 4764 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe" /TN PlZ5iuCabcb4 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1692
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN PlZ5iuCabcb4 > C:\Users\Admin\AppData\Local\Temp\koYeeUevW.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN PlZ5iuCabcb44⤵
- System Location Discovery: System Language Discovery
PID:3084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 6043⤵
- Program crash
PID:1756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 6323⤵
- Program crash
PID:676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7363⤵
- Program crash
PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 6363⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 6323⤵
- Program crash
PID:100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7803⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 14723⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 14723⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 17483⤵
- Program crash
PID:3324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 15363⤵
- Program crash
PID:3492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 16003⤵
- Program crash
PID:1604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 15763⤵
- Program crash
PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 15203⤵
- Program crash
PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 16043⤵
- Program crash
PID:3224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 15363⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 15283⤵
- Program crash
PID:2352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 18283⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 17563⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 6283⤵
- Program crash
PID:180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1148 -ip 11481⤵PID:1660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1148 -ip 11481⤵PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1148 -ip 11481⤵PID:1300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1148 -ip 11481⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1148 -ip 11481⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1148 -ip 11481⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1148 -ip 11481⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1148 -ip 11481⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1148 -ip 11481⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1148 -ip 11481⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1148 -ip 11481⤵PID:1660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1148 -ip 11481⤵PID:1204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1148 -ip 11481⤵PID:772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4160 /prefetch:81⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1148 -ip 11481⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1148 -ip 11481⤵PID:996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1148 -ip 11481⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1148 -ip 11481⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1148 -ip 11481⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1148 -ip 11481⤵PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD55c282bc85ac033fdadf9ed994eee0046
SHA1cdb5a0800ed4e8fac6badd1c512bbe41ecf71769
SHA2566a289403ef98fb4b0379f0149ed76484563f3ba19849224c1437c46cccab0567
SHA5126e1eb279b6e347030250186137094912ceb38701ff8a2c436f9c7544e2233c3b0f7a1154b5ebf23a21a1f7a4242918809217b7b6bbd9a57658851941aec4320b
-
Filesize
1KB
MD573e3bd20519d0ba6fbce65c2691eed66
SHA151fd2e0d716b61f9c55133a08ff4b9e450540eda
SHA256e5091e9ad9e4946aacc38da1f26722ed2012664f1dfd607c046121ff17d5a883
SHA512c60953b1a3ba559183924135777a33fa704fc538f55557e27feb9297dbd12268d50ce30fd0b3abe46826a646b1884e105b9d00de9c32f063a8e6fff544288c19