Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 16:30
Static task
static1
Behavioral task
behavioral1
Sample
beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe
-
Size
356KB
-
MD5
beff853299f04dd01619e8715f29b6b8
-
SHA1
e8c2894a93b102d2f5bf54716e4c6a36139b58fe
-
SHA256
15aa80465397172c0adc7479adeba246b8482d365641900b581f8a6c6ac2e824
-
SHA512
ba70bacd10611b8ca69e9266c7e52fb1fd452c743b49813abd80de65df1236c8d81f78b1d280e5db68df785427700cf7bc370d3f023e1aaf61080631be6b091d
-
SSDEEP
6144:vplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:vplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2236 Dsetup2.exe -
Loads dropped DLL 4 IoCs
pid Process 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 2236 Dsetup2.exe 2236 Dsetup2.exe 2236 Dsetup2.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Dsetup1\Dsetup2.exe beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dsetup2.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 2236 Dsetup2.exe 2236 Dsetup2.exe 2236 Dsetup2.exe 2236 Dsetup2.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2236 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2236 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2236 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2236 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2236 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2236 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2236 3016 beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\beff853299f04dd01619e8715f29b6b8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files\Dsetup1\Dsetup2.exe"C:\Program Files\Dsetup1\Dsetup2.exe" "33201"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD5d7c74f17a9c5bbe135315ddf95aa3195
SHA1e3655e4575184a2505b377af25f529de65ebd1d8
SHA256bafe0cf008310f022fd826f03e481147f7cd79f9d137c2ecf230e90ab831b8ab
SHA51254bbe0baeeaeeba95202f05f9107b52eea103821b2c44cb2be8e241a017ccef2734488cde35da1624cb1407d79d5140565b6b7049c2481a8d62daf3a6ee5bceb