Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe
-
Size
136KB
-
MD5
b798cac7d0969a6369cc0c8d2b3ea169
-
SHA1
0ea8e3fe9dd9f9d3c2605288ad2fbec104555c7b
-
SHA256
c50f512d6dc79915f3f73f0c951641fa1d7e521b62b38ef5fb54af77e2b15e66
-
SHA512
a7aeec6e2d4fa8e5e9cbe8bf28b24c6d8f1f06e2bd21f9bc180683fec3655bfad485cbeeb2a1a514045a57d5079cadc0735524de00a1f28bc6b1c2b7a78b7061
-
SSDEEP
768:j/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLB:jRsvcdcQjosnvnZ6LQ1EB
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2076 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2152 b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe 2152 b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe 2076 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2076 2152 b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2076 2152 b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2076 2152 b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2076 2152 b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD51133bb512fe9b6e71f760aec6eb04a9e
SHA155a6a98f57927e22e1ec52fc3c3e4b01de84ce5d
SHA256006e425e2c2d21fa5f447ffab2522ce4488501472cd8bccea0fe577412da504c
SHA51256f29e65f09b5efe80d53becdac4a3daeccfd05ae9c77b995428c8e05fd1495edbbb1c93edfac7359d89f208fbd3224a6bd4cc6f6d959310080a3838b95ba4e1