Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe
-
Size
562KB
-
MD5
c06edd9c928d267ac9df727443f55448
-
SHA1
96e14aa66d4ea3ddd27784b82d2440ed8e2e5f8d
-
SHA256
a476c6569d6ab92310804d5d1ac6524189d2249d33d0949a0571148730a23cc6
-
SHA512
22f19d07ac4b071432ce4b63f625f2dcc934c8c7966923f67c6ed14185fd1fc246558f13b77d215a7874d7196cd32344fd8ff04bb6540ffb82fea5cc7b576d8a
-
SSDEEP
12288:PJM46GJC0PJ9NDkqOMtV5RMEKmSakp8nsQR6i7ijJmz:1LBn/V5RMEK1JQki73z
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2128 Spoolv.exe 1772 Spoolv.exe -
Loads dropped DLL 7 IoCs
pid Process 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 1992 WerFault.exe 1992 WerFault.exe 1992 WerFault.exe -
resource yara_rule behavioral1/memory/1772-21-0x0000000000600000-0x00000000006ED000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1668 set thread context of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 set thread context of 1772 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1992 1772 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spoolv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spoolv.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2128 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 30 PID 1668 wrote to memory of 1772 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1772 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1772 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1772 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1772 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1772 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1772 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1772 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 31 PID 1668 wrote to memory of 1772 1668 c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe 31 PID 1772 wrote to memory of 1992 1772 Spoolv.exe 32 PID 1772 wrote to memory of 1992 1772 Spoolv.exe 32 PID 1772 wrote to memory of 1992 1772 Spoolv.exe 32 PID 1772 wrote to memory of 1992 1772 Spoolv.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c06edd9c928d267ac9df727443f55448_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\Spoolv.exeC:\Users\Admin\AppData\Roaming\Spoolv.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Users\Admin\AppData\Roaming\Spoolv.exeC:\Users\Admin\AppData\Roaming\Spoolv.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 363⤵
- Loads dropped DLL
- Program crash
PID:1992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53d9bb6f53646c6a96df819bdb471796a
SHA146d2d340398594f5060373f81232b82211e32825
SHA256c0657322afdac0df459f3bc233ecf362838774a116ff8d82846914925d246e83
SHA512b6165a7be23878cf75a70745d87767041f5a413c2f27d51440974ef205e09e10789cdc540bb504cd4cb4b857ae7d16e935fce85f1a618dde8b1f44471b661873