Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe
-
Size
108KB
-
MD5
befe4a55546c48fd3589719339f1add2
-
SHA1
4f2a11899431dbc10212358fa86af570a2f90833
-
SHA256
a3cd2e4d5f7302f9b5f6d802224038fd0e52139013044c531bfb614e6a2e8c87
-
SHA512
70236f297aa9277df09766d0aa87e87dbe00b439029c055c1fe109903b17bc6add88147bb061a067f430b04e651289b8969d4243db7234a11ef9191eb8a13c57
-
SSDEEP
1536:RySvEtQwOxcPz0wHNDYHQa/HAwai4HQHWFx7qzrzlayH+Jq3z/V2:tqPzZS9HA9i4HeYqzrzlayH+JqJ2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2132 system 2384 yqeyie.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\x86-ms6012453.log befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe File created C:\Windows\SysWOW64\x86-ms6012452.log befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2384 set thread context of 1712 2384 yqeyie.exe 35 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\yqeyie.exe befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1732 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yqeyie.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 system Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz system -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1956 befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe 1956 befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe 2132 system -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2132 1956 befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2132 1956 befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2132 1956 befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2132 1956 befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2344 1956 befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe 31 PID 1956 wrote to memory of 2344 1956 befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe 31 PID 1956 wrote to memory of 2344 1956 befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe 31 PID 1956 wrote to memory of 2344 1956 befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe 31 PID 2344 wrote to memory of 1732 2344 cmd.exe 33 PID 2344 wrote to memory of 1732 2344 cmd.exe 33 PID 2344 wrote to memory of 1732 2344 cmd.exe 33 PID 2344 wrote to memory of 1732 2344 cmd.exe 33 PID 2384 wrote to memory of 1712 2384 yqeyie.exe 35 PID 2384 wrote to memory of 1712 2384 yqeyie.exe 35 PID 2384 wrote to memory of 1712 2384 yqeyie.exe 35 PID 2384 wrote to memory of 1712 2384 yqeyie.exe 35 PID 2384 wrote to memory of 1712 2384 yqeyie.exe 35 PID 2384 wrote to memory of 1712 2384 yqeyie.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\befe4a55546c48fd3589719339f1add2_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\systemC:\system2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc start WMMNetworkGpf2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\sc.exesc start WMMNetworkGpf3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
C:\Program Files\yqeyie.exe"C:\Program Files\yqeyie.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\windows\SysWOW64\svchost.exeC:\windows\system32\svchost.exe2⤵PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD5ec3c0c1b727b0bac0500ec04652984d2
SHA1d29b683f4984eef24c081196788d957abce53e25
SHA2566ce49da9c22f16abdd3a0366559bd21388d14a47134e109ca29a0d894b5cc9ba
SHA5120d5bf1f97c03221525773c0272fd04649f4ab1d0210e29900b05408b01729bfd1b47f6d5d0a62c7b795c953b074df3126e887ff6554f8717fec5b6161b925aa0
-
Filesize
8.1MB
MD554e3dbc47a12596ed3788515cf3392f5
SHA1a83b23d9ed521fa8b8c989e182e915920ba00472
SHA256ff9f350255b4cac018535ef0eb5528fed6e34ae57f0ae930e7209c501e09c74b
SHA51238ae2c496f7a235552ab5d5f17973e55698bbe6b56dc41a081d01c3eb497bbd5f78d130d9f6b45440a6520cff96d7342349b2dfcdfdba11f609eea900d7e0d30