Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 22:02
Behavioral task
behavioral1
Sample
bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe
-
Size
56KB
-
MD5
bf8177fb3c50f37c7e70d35345f75525
-
SHA1
cd476c0c595e81a8c388b845b7a232c344d13267
-
SHA256
f5cb76a376f45613de04b13af0114739318d3831198bcc7167cba3b88a0deaec
-
SHA512
8aeebeef220efe0b62c16bf3c03994fc24fd0b456b768dbece66fe5c11cabbd331358fc6ac18dfa8e1815e7484924abe99307567cd4a7472346a752816ff516e
-
SSDEEP
1536:D77m63WnpvIDXgIcpzdFfsMMtO8GzjvcTukJ:D77m605QiFfsMUOHkukJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2192 bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2360 bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2360-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x0008000000012119-12.dat upx behavioral1/memory/2192-16-0x0000000000400000-0x000000000043A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2360 bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2360 bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe 2192 bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2192 2360 bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2192 2360 bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2192 2360 bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2192 2360 bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bf8177fb3c50f37c7e70d35345f75525_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5babd0ef681a8e729b4af733a5aa8c9ec
SHA1add0dd68f9f84918cd53411825e42472dbae4d40
SHA256463904a30e19a22da938e09737ce38718b9e5b370cc939e2a591eb2204c5cf14
SHA512ad4d162af2a42eafbf7c08e2dfde7d65412f0ebc71786584474e145ac908228b094155b0446ef5de794d1097fa2edfa502ce7d93ba7b4838090d03958f7eccc3