Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 09:14
Static task
static1
Behavioral task
behavioral1
Sample
c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe
-
Size
100KB
-
MD5
c06a562e4b83e5a2a0bd4218bbd1f156
-
SHA1
44f146e50d22fdae01f19323399805c7fcc1b2bc
-
SHA256
56a431e91f21de9fa7dbb8dce8825cf7fb66738cea7982937c4ddbd424161d4e
-
SHA512
3feb062af43f1af6a5eeb2d0fa712782d43a479aa3b88c5273d10678b9d6857dc495029c2d2f69ccde52ab702f47eae264fd9938fe77b1dfb7fe270ac3807eb2
-
SSDEEP
1536:RTFu/otVANzYXAyPSr8UAu+EOznX2SGhI6HLTNnx6sCTiLnSOTEDVgu:RTs/otVA6XJarrOpx69nx6ZTM3Ej
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2928 tt.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\tt.exe c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 304 2928 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tt.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1528 c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2928 1528 c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe 30 PID 1528 wrote to memory of 2928 1528 c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe 30 PID 1528 wrote to memory of 2928 1528 c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe 30 PID 1528 wrote to memory of 2928 1528 c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe 30 PID 2928 wrote to memory of 304 2928 tt.exe 31 PID 2928 wrote to memory of 304 2928 tt.exe 31 PID 2928 wrote to memory of 304 2928 tt.exe 31 PID 2928 wrote to memory of 304 2928 tt.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c06a562e4b83e5a2a0bd4218bbd1f156_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\tt.exe"C:\Windows\tt.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 363⤵
- Program crash
PID:304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5af52504127540aa2e816ded2fae1f38f
SHA18a9972f9e313a325702717598eb5fe7219a42cf9
SHA256cfb7db1ef027ab0f648ad658fa365017ad79a3940e7d1ff43c95fbe3cdde7b36
SHA512cb4ea91d43aa9e6461dfc0b0abde1dd70ed47df8076e6434642c584b2293abe7a9aadd7fbd6318acd23be4ac1aa55e171fc8791e63d7f766e06f5cedc9de99c7