Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe
-
Size
85KB
-
MD5
c1455f76ba619bc0dcdb9bf0fcb62640
-
SHA1
dace71d0072c62982602f988763713451be15530
-
SHA256
958bcbcea8d6da363fa6af2c1483087c3a16e95369b7107f073de0ccc981009d
-
SHA512
7d8c0a9124386323cc41585c1dab75951ea844be97aa8d4934569c6c59ea927e2d07ed23eebb71c66b7b86a4f7f948b144b43d35480cddd9c7a28dfc3eb49067
-
SSDEEP
1536:RUeHiWRgkkjH8nyWmJjukOfgKTynmtWUzH7DnA3VqiY1h+rY0u0vwxUM8Y:Rd/vyWmJjuv9mmtWkDnYVah+r3u0YxEY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2372 keygen.exe 2092 smss.exe -
Loads dropped DLL 14 IoCs
pid Process 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 2372 keygen.exe 2372 keygen.exe 2372 keygen.exe 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 2092 smss.exe 2092 smss.exe 2092 smss.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2744 2092 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2372 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 30 PID 2580 wrote to memory of 2372 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 30 PID 2580 wrote to memory of 2372 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 30 PID 2580 wrote to memory of 2372 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 30 PID 2580 wrote to memory of 2372 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 30 PID 2580 wrote to memory of 2372 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 30 PID 2580 wrote to memory of 2372 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 30 PID 2580 wrote to memory of 2092 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 31 PID 2580 wrote to memory of 2092 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 31 PID 2580 wrote to memory of 2092 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 31 PID 2580 wrote to memory of 2092 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 31 PID 2580 wrote to memory of 2092 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 31 PID 2580 wrote to memory of 2092 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 31 PID 2580 wrote to memory of 2092 2580 c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2744 2092 smss.exe 32 PID 2092 wrote to memory of 2744 2092 smss.exe 32 PID 2092 wrote to memory of 2744 2092 smss.exe 32 PID 2092 wrote to memory of 2744 2092 smss.exe 32 PID 2092 wrote to memory of 2744 2092 smss.exe 32 PID 2092 wrote to memory of 2744 2092 smss.exe 32 PID 2092 wrote to memory of 2744 2092 smss.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1455f76ba619bc0dcdb9bf0fcb62640_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\UYRD4E\keygen.exeC:\Users\Admin\AppData\Local\Temp\UYRD4E\keygen.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\UYRD4E\smss.exe"C:\Users\Admin\AppData\Local\Temp\UYRD4E\smss.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 2603⤵
- Loads dropped DLL
- Program crash
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5764816b0853f4bc76d92878e04490632
SHA1bfc2997c3a61a8abb53091669ff853d511dcea0f
SHA256d6d2c70ceac9723149acae43eb288e25080a46d9f5880cde35f94b8d55d27723
SHA512b5cff3105b4602129445e5100d71cb04ee04bcca916966cbcc06ed059a8da20db31c4671ef93af7a526de50a0da8edb1fdae3441f148cbc9f78c449b812c0c2b
-
Filesize
31KB
MD53c552c8ce83792c261511288cbe45990
SHA106d6dc3eb66cfc85f053a7e91472067b4e1ebc29
SHA256b0c3bc431a6f3b363ae17d1569901cd4c0e28c940835d520762e2cce76b1f702
SHA512d230e9c8aadc1587970c75a2925236b9b153bfc49e16eca4b047447093430fbf48a76dae801c1c7866b9e8d46ed5f8c95ec74a6883cc6bc078d8f338d57613f3
-
Filesize
14KB
MD5904beebec2790ee2ca0c90fc448ac7e0
SHA140fabf1eb0a3b7168351c4514c5288216cb1566d
SHA256f730d9385bf72eac5d579bcf1f7e4330f1d239ca1054d4ead48e9e363d9f4222
SHA5128bdbbaaf73e396cf9fd9866b3e824b7e70c59a2bdefdb3236387e60d0e645d011265fe79fb193f6c0d6abe2e9c01260720c71cd8f068fcc4624760511c54efaa