Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe
-
Size
32KB
-
MD5
b354446f27096f68eb5e8fdfc628419e
-
SHA1
0775bf7f987fae85c9ec08c2872f931705828e1a
-
SHA256
57b8695d861d70b700b75f9e1a68069172051fa90b1e6cad6fb00eaee5b26222
-
SHA512
8d7af4d3cddd5f43a77dba045a3e3661353f455c0dfd506528e3a077ff2e1b5a2891754e982a27fca0af6ad9bbc46a786c857eb262938d08b9d1d1391c60d00c
-
SSDEEP
384:4YgAUDjUL9fvGt7Ma+lhsSJAmu1KymGa:4topgv+lhsShoKB
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Macromadendt\MsShellExt\fxdapta.ini b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2160 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe 2160 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2880 2160 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe 28 PID 2160 wrote to memory of 2880 2160 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe 28 PID 2160 wrote to memory of 2880 2160 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe 28 PID 2160 wrote to memory of 2880 2160 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2848 2880 net.exe 30 PID 2880 wrote to memory of 2848 2880 net.exe 30 PID 2880 wrote to memory of 2848 2880 net.exe 30 PID 2880 wrote to memory of 2848 2880 net.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\net.exenet start mtsodfdss2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start mtsodfdss3⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-