Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 10:21
Static task
static1
Behavioral task
behavioral1
Sample
aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe
-
Size
36KB
-
MD5
aedb6c6f43c6eabeb5e0d3a330fd7805
-
SHA1
4dd60f0b2b6ec3fa212c2613aa6fe7ae98f0da38
-
SHA256
aa8141acf1d328e02d4b02ddd2d71283ef8d739e15b177a29ecdb3a3718f8859
-
SHA512
5bb3885c49134aa9519c0ec66fa6370fa591572d35385309dc90ab2ca9e16c1261e045407a11f10bb2f065eb98933e136618bcf00c05d23b8d97554b7828289e
-
SSDEEP
192:/T5LJkFo0moaN23Lx/8xvsK2BHxxntILdbLMRLf:/TzkFoxPC1/8xvsKI89MRLf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2340 juasp.exe -
Loads dropped DLL 2 IoCs
pid Process 2832 cmd.exe 2832 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language juasp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe 2340 juasp.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2832 2752 aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2832 2752 aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2832 2752 aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2832 2752 aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe 30 PID 2832 wrote to memory of 2340 2832 cmd.exe 32 PID 2832 wrote to memory of 2340 2832 cmd.exe 32 PID 2832 wrote to memory of 2340 2832 cmd.exe 32 PID 2832 wrote to memory of 2340 2832 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aedb6c6f43c6eabeb5e0d3a330fd7805_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\juasp.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\juasp.exeC:\Users\Admin\AppData\Local\Temp\juasp.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5492c993617419e8ba579b1de584ec7b4
SHA1115e17d8d97e44600a956dfc409ee91a18ce4246
SHA25623ac5a264856301393d29cea5dc678c5963ba5517a9499628d0fe3168e05734c
SHA512e6ece2ac20013e753b715f7a7189a97ea14baa6e1109a59fd1a3871eff657abbe8d6ad3c4b140dfba18cd4b142546321c9d8e1e2b4b8156072c7f5b844ea28d8