Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 07:09
Behavioral task
behavioral1
Sample
b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe
-
Size
411KB
-
MD5
b28ae95d1bca5ed560169cf2f31568c7
-
SHA1
4f019ea4c979a81b84507d3a5fa9c276f2debbb2
-
SHA256
888420bbedfc70fdcdde67c8e9d1bf2b6cce82aa0245b526e3c2988da7a719c3
-
SHA512
6a994ab270b5d5da7c38b2ee8f4676505f40527d1842e2eab987747bac780366ee2d74894847106973a134567818ae71377b594285dcdaa5c1d778ec665172a4
-
SSDEEP
12288:6wy3CDUqK89DMZYAa3kMGwS9AUtniWU15x/:4qF9DMEh+i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 Txepoa.exe -
resource yara_rule behavioral1/memory/2392-0-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2392-9-0x0000000000370000-0x00000000003D9000-memory.dmp upx behavioral1/files/0x0007000000018bfc-13.dat upx behavioral1/memory/2056-14-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe File created C:\Windows\Txepoa.exe b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe File opened for modification C:\Windows\Txepoa.exe b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Txepoa.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Txepoa.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Txepoa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main Txepoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe 2056 Txepoa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 Txepoa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2392 b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe 2056 Txepoa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2056 2392 b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe 31 PID 2392 wrote to memory of 2056 2392 b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe 31 PID 2392 wrote to memory of 2056 2392 b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe 31 PID 2392 wrote to memory of 2056 2392 b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b28ae95d1bca5ed560169cf2f31568c7_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\Txepoa.exeC:\Windows\Txepoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD56bcbe80bf05c9a60a3061bfcf6215838
SHA1b9ed20c471d0136cc94d4d7e34e77b566c7cb5b0
SHA2561ad145924ff2946e02afa51fad76e566855bd29e438380a7a71c3c17651bc969
SHA512b70f1a8d482a897577304042080b2ec4118fcbc1863176b686f77cd4d6043e104b14687782e39ca43b925ba744c79f3a211523ba85fc92b36125ba8dc6041a4c
-
Filesize
411KB
MD5b28ae95d1bca5ed560169cf2f31568c7
SHA14f019ea4c979a81b84507d3a5fa9c276f2debbb2
SHA256888420bbedfc70fdcdde67c8e9d1bf2b6cce82aa0245b526e3c2988da7a719c3
SHA5126a994ab270b5d5da7c38b2ee8f4676505f40527d1842e2eab987747bac780366ee2d74894847106973a134567818ae71377b594285dcdaa5c1d778ec665172a4