Analysis
-
max time kernel
7s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe
-
Size
702KB
-
MD5
b75c6f4e544afaa44d511c9e37efab81
-
SHA1
e7e47aad999e4c1b1af4fc113082d514e84aadf4
-
SHA256
12ff53a12e370aa39731b6c4ea18557f4d7ddf7584eb6b34c88ed245600beeeb
-
SHA512
d3a908f5c011493e3b87dbe8b38a0a10bcf917feb1a684a8bef9358af536e3693478100ec0188c064b0a44230e0be2a5bf3e59bfbef42c0b62e1087b33fd4496
-
SSDEEP
12288:2mexve0N2txy3uf9ylYkiGWQQ28LQiVH2F3Z4mxxFzjZCIPZitNSpH3fq:2JIxy+EekiX2biZ2QmXRNPPZIS53fq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1276 SERVER~1.EXE -
Loads dropped DLL 3 IoCs
pid Process 2608 b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe 2608 b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe 1276 SERVER~1.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2608 wrote to memory of 1276 2608 b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe 31 PID 2608 wrote to memory of 1276 2608 b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe 31 PID 2608 wrote to memory of 1276 2608 b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe 31 PID 2608 wrote to memory of 1276 2608 b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe 31 PID 2608 wrote to memory of 1276 2608 b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe 31 PID 2608 wrote to memory of 1276 2608 b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe 31 PID 2608 wrote to memory of 1276 2608 b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b75c6f4e544afaa44d511c9e37efab81_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
343KB
MD549d2063c9ee556466cb06878149bf54d
SHA1513de252457743340bb94867fad6571f23f6b2d6
SHA256ee9f51bb9130276beb27829ad8f7ae3f1e85e76100fbbcc6f5ce4400fe6006d4
SHA512824572ed13d02db79063fd7acca3525fc38232425b4f49fea21c0d94ed4eb69ba78c12816d6489d9062a41ef874f8a49edfd3c571d6833db25d40d32d2083b5a