Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe
-
Size
426KB
-
MD5
b6d1fda41f266f6080b97f46c40aea73
-
SHA1
70ffd879ad4028c8a5c103398e88999580b4d806
-
SHA256
2233e8860a1a352d103dd2bf7369faae298094b773c8362e23b1745458cda0ff
-
SHA512
96a681eb0f393a08d23695285af7a0709e69d37fa727a88e97f87f0513915649bcc4829e76c27810945aaf03a5f9c17bdb2f4f5c9d788b78906e927fd937e22c
-
SSDEEP
12288:YkWJf+DybqjGiBqYGCfZ2nPzMyxOcMKY4:YZ+ye7svwQYyoKH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2808 108.exe 2716 ÁØÁØÖúÊÖ4.5.exe -
Loads dropped DLL 12 IoCs
pid Process 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 2808 108.exe 2808 108.exe 2808 108.exe 2716 ÁØÁØÖúÊÖ4.5.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winio.vxd ÁØÁØÖúÊÖ4.5.exe File created C:\Windows\SysWOW64\WinIo.dll ÁØÁØÖúÊÖ4.5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2616 2716 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 108.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÁØÁØÖúÊÖ4.5.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2716 ÁØÁØÖúÊÖ4.5.exe 2716 ÁØÁØÖúÊÖ4.5.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2808 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2808 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2808 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2808 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2808 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2808 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2808 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2716 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2716 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2716 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2716 2732 b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2616 2716 ÁØÁØÖúÊÖ4.5.exe 32 PID 2716 wrote to memory of 2616 2716 ÁØÁØÖúÊÖ4.5.exe 32 PID 2716 wrote to memory of 2616 2716 ÁØÁØÖúÊÖ4.5.exe 32 PID 2716 wrote to memory of 2616 2716 ÁØÁØÖúÊÖ4.5.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6d1fda41f266f6080b97f46c40aea73_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\108.exe"C:\Users\Admin\AppData\Local\Temp\108.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\ÁØÁØÖúÊÖ4.5.exe"C:\Users\Admin\AppData\Local\Temp\ÁØÁØÖúÊÖ4.5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 4443⤵
- Loads dropped DLL
- Program crash
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD5cb16c5887e92878b247e9fe0dfac25bc
SHA124e2e743d4ba06f816a72788f4d067cc1f6a3c11
SHA256edfdde41df27cb01fd17b182e7c831a9f86e5a72318c8da2a796e7eeae407bab
SHA512a7c2d3111062755140d63a3a77f615e7a2819588178b9bc8f2c1cfa021b5f1fee993985b8a4d01616a914af53b7dd20cf5f069280ec878457e034e231c6f62ad
-
Filesize
744KB
MD5764cdf50172f71f1e392346d8180effa
SHA1b7bd190b3541e7b5a14fed2865fee8f43d0bf245
SHA256caf5321770c10f95bdb40fd9a9123aaafcda36358c5507cce8482b45986bd45e
SHA5122e8557def396aab2e78b6fe3341bf28b5115f958d9c984cfd1e9d481c76ad2ba228aafcbffd5a952fe03aa1d18fb410eacdbee4c21cc704c238d4afc8c5c9fc4
-
Filesize
36KB
MD5b3b6289999a2762c7da8104e5f47f7ee
SHA1ea3bb66a6de13d86bd40a3005374d4cc9bbb1520
SHA25673663dff8f7ac6ee85f9a7eeca762b002ee615c03b110e0bb64fc69f7b462565
SHA512364d476f71df9b881c34687482e8524a23eaa95bfee5b799c98eaf633880e92ee11a1dbdeeddc3f2e00a8b9cddcb937d3f1b126091d65c2cf4f4e87bafd0d6e5