Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 03:34
Behavioral task
behavioral1
Sample
b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe
-
Size
57KB
-
MD5
b1f4f2f8ab68b9ae551f8001e70164b5
-
SHA1
18eb1331e44576eaafe520f94cf68cbfbc6c8b29
-
SHA256
040d1a7eb06f8bdca3a4d2cd6c27591ed6dd0e1aab4fe44f4e69401867bb8d80
-
SHA512
bdd669093607ab9cda2c012af505df6d10436b2fa7241a6696833f1ce642478903a2733033b35b5967a1880103a79726767ea39b3045160175388db164a156f3
-
SSDEEP
1536:83Rg6gFyvetFBUZ5oXGPJTwh0/A712IvzU7YQTm7k541Nj:8SFy2yZ5kGPJQ0/8hQTm4541N
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\host7 b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2856 cmd.exe -
resource yara_rule behavioral1/memory/2068-0-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sdel.bat b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe File created C:\Windows\gotrg.sys b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2068 b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2856 2068 b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2856 2068 b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2856 2068 b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2856 2068 b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\sdel.bat" "C:\Users\Admin\AppData\Local\Temp\b1f4f2f8ab68b9ae551f8001e70164b5_JaffaCakes118.exe""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87B
MD5c422f73e563f284c81c1a23aff9e3d57
SHA140a866138213d046c7982e2eef29349457ba0d76
SHA256735faf8fc874f00472cbb0abc08cb86390d44c737e77558c2b93bfeefc2c4d16
SHA512355fab1efd9f78ee8f8f9260c80634493fc7b4b2fcefa71bcb938ec89cb788b52ad2ffe3a24d0aa18af00db29102d365859c0635524ebc87638bda3f05b8444a