Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe
-
Size
119KB
-
MD5
ae26230af51412af2914f2b75f56bca2
-
SHA1
0c8cae26c4d376e9cf1810f9ad63a4a41df0cc44
-
SHA256
2859e3230a12fa6b1797ea84efb2ba17baa432b8208b22b1e78b6d9ecf2c2e9f
-
SHA512
e6acef4b4167d2a62ecc7907b426194f029994e0a77d1b314a9b5e8d1a6af17a2230aaa508359fc33d1088901d0df0c89c2fe82c6a87b25d5ed6e999ff07d4b6
-
SSDEEP
3072:tg1noG1Gz1dHxgdSGFBp2h/GGY/TYly8wVdJan:G1nz1mRgd5FBp2h/HYclyda
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0006000000018710-22.dat aspack_v212_v242 behavioral1/files/0x00070000000186d9-11.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2840 FtOEmiC.exe -
resource yara_rule behavioral1/files/0x0006000000018710-22.dat vmprotect -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\GUFrt.Qjh ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mshtml.dll ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\DllCache\mshtml.dllGUFrt ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\DllCache\mshtml.dll ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mshtml.dllGUFrt ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mshtml.dll.mod ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe File created C:\Windows\SysWOW64\mshtml.dll.mod ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\win.ini ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe File created C:\Windows\FtOEmiC.exe ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe File opened for modification C:\Windows\FtOEmiC.exe ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2888 2008 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2008 ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2840 2008 ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2840 2008 ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2840 2008 ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2840 2008 ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2888 2008 ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe 31 PID 2008 wrote to memory of 2888 2008 ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe 31 PID 2008 wrote to memory of 2888 2008 ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe 31 PID 2008 wrote to memory of 2888 2008 ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae26230af51412af2914f2b75f56bca2_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\FtOEmiC.exe"C:\Windows\FtOEmiC.exe"2⤵
- Executes dropped EXE
PID:2840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 3442⤵
- Program crash
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5b1be13a74da5acf53e8c291f35aea8b5
SHA1daec710e35500f01df341552523d8a358630fad8
SHA2566836941c8420da91a68b19e12c526b4fcc9b70a4d3af06df29f4177080c8c244
SHA51295b7d2e959025a3fb461c22b4dcbc86de32395f10725d61a5b4d6bd69aae78542436df5188bf52a831815e2b277aa00e68bd4c45c5cda2a739d54a28211a5690
-
Filesize
51KB
MD5062fae9998838a4f130ab0d62e48aa0d
SHA1b358cc42a3d0be33ac0fa3b94383d5512fd85ff7
SHA2568c6d7fdcfee602e7f966e445422fa95d26d744b6331ea76e5337a00d5df2e675
SHA5125b856371202225e8931351301cbbc22b2b73078448d57070cd068c5fef07435d245a990e5ad68558ba56dbd759d7bbd4ca2d7eb4f4f970882f7d697f191d9037