Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe
-
Size
226KB
-
MD5
bc34fa4b3b7ca2f0f6a404bef0e61878
-
SHA1
a8852d6aa432a1cba54ab4857289dc191a4a1036
-
SHA256
1222965569dc3023eaf963d84527e5c92301c7157b2f9d2abd58f12e545bc152
-
SHA512
9f30c69732de4585b340ecc443a16f42da76cf6e068e0e0dcf5756d7384edf38f125571620368621b0bf93603513ebcf72d77723160376b9ed8e583ca073ebf0
-
SSDEEP
6144:w+tTAqgYhO9MegccZ7nt44e42kps1VqPjwrhwlp1B:wZohO9MJdnt3e/rqsrWB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2808 Upekea.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\QK9G0Z54EX = "C:\\Windows\\Upekea.exe" Upekea.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe File created C:\Windows\Upekea.exe bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe File opened for modification C:\Windows\Upekea.exe bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Upekea.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Upekea.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International Upekea.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main Upekea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe 2808 Upekea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2808 1636 bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe 30 PID 1636 wrote to memory of 2808 1636 bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe 30 PID 1636 wrote to memory of 2808 1636 bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe 30 PID 1636 wrote to memory of 2808 1636 bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc34fa4b3b7ca2f0f6a404bef0e61878_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\Upekea.exeC:\Windows\Upekea.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD54d5b95c70b14c3e24e9a5d8f8d40671b
SHA19ec2d46708be2feede1080a79a13b3f905aa61a8
SHA256de547197c78a9b28f4c63c1866f3e4679b309f5a81b9d7d945fd8d83b46607d7
SHA512133116f6fbdb4f2c8948d8f15772b0d2c4f962059c1530f33620e716ca8c1502fc961bc16faead5e5ffd37d835a6c0a7b81b482095a174e1717c14d9aea67cb2
-
Filesize
226KB
MD5bc34fa4b3b7ca2f0f6a404bef0e61878
SHA1a8852d6aa432a1cba54ab4857289dc191a4a1036
SHA2561222965569dc3023eaf963d84527e5c92301c7157b2f9d2abd58f12e545bc152
SHA5129f30c69732de4585b340ecc443a16f42da76cf6e068e0e0dcf5756d7384edf38f125571620368621b0bf93603513ebcf72d77723160376b9ed8e583ca073ebf0