Analysis
-
max time kernel
141s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 16:53
Static task
static1
Behavioral task
behavioral1
Sample
bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe
-
Size
702KB
-
MD5
bf09f50bde9125ba0ec9a31c339f152a
-
SHA1
cfb2f86c9009030fb26d98044dc75093b62e1b86
-
SHA256
d15d667ea6dd6f96ae968875773e127d9f9856da5ef0824316f6cbaad6d48e58
-
SHA512
1700aa8e0761bc6e50266c0b1b4440839f9e2290d744648769a2c8ad6d613abe84c783cf39b99702ca264b569ea3c17956192fba330830be684705150fcbf119
-
SSDEEP
12288:GL61r0IcNh0jeTJf+0G6XCF3Z4mxx8DqVTVOC6Tc:vSbJfLGNQmXbVTzH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2152 zxc.exe -
Loads dropped DLL 8 IoCs
pid Process 1756 bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe 1756 bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe 2152 zxc.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2332 2152 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2152 1756 bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2152 1756 bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2152 1756 bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2152 1756 bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2152 1756 bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2152 1756 bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2152 1756 bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe 29 PID 2152 wrote to memory of 2332 2152 zxc.exe 30 PID 2152 wrote to memory of 2332 2152 zxc.exe 30 PID 2152 wrote to memory of 2332 2152 zxc.exe 30 PID 2152 wrote to memory of 2332 2152 zxc.exe 30 PID 2152 wrote to memory of 2332 2152 zxc.exe 30 PID 2152 wrote to memory of 2332 2152 zxc.exe 30 PID 2152 wrote to memory of 2332 2152 zxc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf09f50bde9125ba0ec9a31c339f152a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zxc.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zxc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 2683⤵
- Loads dropped DLL
- Program crash
PID:2332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341KB
MD5667d0f436836b4dd3bb63f6c63d97f5d
SHA1c3bb11be960a16f0fe9bb1e56670a31c119c0153
SHA2564fb8e0864b737db515d5fcba7d3a3ce901dab7adae99087bd35ed25a786ecd10
SHA512efd0f33b0f439d4e401a8a25673f9258d8a1d6cc2a5a99ce8355ad925623ba1835d74fe32efe946a6bac7aa5f9303532cef6dfbf6d224f5eb191b9807c1e64fb