Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe
-
Size
191KB
-
MD5
c259036fc6f89e4b4a110c2305084928
-
SHA1
10180f8fc2d987ea0c2e469e396202fcc2c4af18
-
SHA256
bfb40b894295244cd6c55a8b79c33a191914ce1044612d2a54d7368ba2726a60
-
SHA512
d5cc70bf08d9a7f4f5f204dc9840b6bfb5f055bb28ddcc27b48a9cf477240450531c57c70543348eb8a1d83e46bd20a49d91b85c23f7e938bedfda89a249119d
-
SSDEEP
3072:NAjJdxQJwUfkOBsofaO+PXjFD2EaeM0XOrzHuQ6iK/ipWD7bjHUZ32:KJdxhSBsRnpMes3OQ6iIiWTUk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 hg.exe -
resource yara_rule behavioral1/memory/2736-11-0x0000000000220000-0x00000000002A0000-memory.dmp upx behavioral1/memory/2736-12-0x0000000000220000-0x00000000002A0000-memory.dmp upx behavioral1/memory/2736-15-0x0000000000220000-0x00000000002A0000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\hg.exe c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2696 2736 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2772 c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2736 2772 c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2736 2772 c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2736 2772 c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2736 2772 c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2696 2736 hg.exe 31 PID 2736 wrote to memory of 2696 2736 hg.exe 31 PID 2736 wrote to memory of 2696 2736 hg.exe 31 PID 2736 wrote to memory of 2696 2736 hg.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c259036fc6f89e4b4a110c2305084928_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\hg.exe"C:\Windows\hg.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 1243⤵
- Program crash
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD5e50666be8b9295eed85298a7e6c43ae1
SHA1f81130a96aeae3aeb3d7b1fc4fce4c093dbfd266
SHA256d23e1cbc33dd14beb186277ee66541261ecef98334fb63251ff1a15d7c60a8a3
SHA512f5ee6628055ad90ec522343257796d37dd861950df779130332a091a176e94e3267589a868fc4c26ee98212524dadb77ad00ce7d8eb4750c8f65f1c3fb810a15