Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 10:30
Behavioral task
behavioral1
Sample
b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe
-
Size
106KB
-
MD5
b31c701b9679ce8895eac526ed97ec49
-
SHA1
aa208d039b362b9536944013158f19d651393a5a
-
SHA256
cb9aafa72b611be752cd750062c6f0bd23360d263a150b2de14dc617ff71002d
-
SHA512
4cf4ef6ffa789dccd276ca9fffef8d36b5158b41d3389dab0f7309ce48ef1c0b2a28d4d5e7d1c1fa8d6b3844666eeb90434a11dc7dbad470bfbecc83e838862f
-
SSDEEP
3072:MeCe2KhWglJDS2a6pPe3QlstLSPim7MUMqkktpkxvV:imNk6VVJPPXpd7At
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2176 apocalyps32.exe -
resource yara_rule behavioral1/memory/2072-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000b00000001227c-7.dat upx behavioral1/memory/2176-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2072-8-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2176-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2176-12-0x0000000040010000-0x000000004004C000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe File opened for modification C:\Windows\apocalyps32.exe b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2176 2072 b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2176 2072 b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2176 2072 b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2176 2072 b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe 30 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31 PID 2176 wrote to memory of 1980 2176 apocalyps32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\apocalyps32.exe-bs2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5b31c701b9679ce8895eac526ed97ec49
SHA1aa208d039b362b9536944013158f19d651393a5a
SHA256cb9aafa72b611be752cd750062c6f0bd23360d263a150b2de14dc617ff71002d
SHA5124cf4ef6ffa789dccd276ca9fffef8d36b5158b41d3389dab0f7309ce48ef1c0b2a28d4d5e7d1c1fa8d6b3844666eeb90434a11dc7dbad470bfbecc83e838862f