Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
b82a139b2b6591af60380c9065993397_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b82a139b2b6591af60380c9065993397_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b82a139b2b6591af60380c9065993397_JaffaCakes118.exe
-
Size
16KB
-
MD5
b82a139b2b6591af60380c9065993397
-
SHA1
3134641a166ca5cc9915797c6840fa71c6fa5529
-
SHA256
5ae856841007a228299d2048fcded4bd0d7faf26548f48a6aa278ea6ae9481bb
-
SHA512
a32e2a8d0d21af53af484954fd01a9a1123cac2e9c5386b1172e7968d727e6926a6790984bea6dd6816d07b65717a0f94453485a6ff30c385c1f80ffd44e9b3f
-
SSDEEP
384:IQ1tYJ5CtlLjz9rY+JabpKYIOfBae3TWG08up:nbYJ5ilLjfJrOJa8qG07
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2392 cmd.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\wins\svchost.exe b82a139b2b6591af60380c9065993397_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ctfmon.exe cmd.exe File created C:\Windows\SysWOW64\ctfmon.exe cmd.exe File created C:\Windows\SysWOW64\dllcache\ctfmon.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b82a139b2b6591af60380c9065993397_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2744 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2784 b82a139b2b6591af60380c9065993397_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2392 2784 b82a139b2b6591af60380c9065993397_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2392 2784 b82a139b2b6591af60380c9065993397_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2392 2784 b82a139b2b6591af60380c9065993397_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2392 2784 b82a139b2b6591af60380c9065993397_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2744 2392 cmd.exe 32 PID 2392 wrote to memory of 2744 2392 cmd.exe 32 PID 2392 wrote to memory of 2744 2392 cmd.exe 32 PID 2392 wrote to memory of 2744 2392 cmd.exe 32 PID 2392 wrote to memory of 2852 2392 cmd.exe 33 PID 2392 wrote to memory of 2852 2392 cmd.exe 33 PID 2392 wrote to memory of 2852 2392 cmd.exe 33 PID 2392 wrote to memory of 2852 2392 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b82a139b2b6591af60380c9065993397_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b82a139b2b6591af60380c9065993397_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\delrunme.bat2⤵
- Deletes itself
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\ipconfig.exeipconfig3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2744
-
-
C:\Windows\SysWOW64\ctfmon.exeC:\Windows\system32\ctfmon.exe3⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412B
MD5fddad06e8ea32c1dfa7eb99b60a063b7
SHA10144f15ee407c8fe28e246c17563e659a6845827
SHA256cbe6045099d5e15c047091d342d0ea1e5a59111de3148bb0b09c56ce91b37f8c
SHA51216a54a78fd613880dec3becfaa526f3b75730aa3f3316df48217698a988beaa8e892635d2c2a9115680bdf0589445279ef5dd41a1df074a4f3f43762edab727b