Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 07:33
Behavioral task
behavioral1
Sample
c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe
-
Size
12KB
-
MD5
c28b048c1087a2c39d4b869fd952d6a0
-
SHA1
d13971faa15d2da66ea67e8318ba1895c579d42d
-
SHA256
dcb004958684cb218167a7193de22fbf98fab69b8d37cdf5260133fe667d501f
-
SHA512
94f584f57ed53fc67ae181661b7f105c4506c7f0184942c889d498a8a3458fd2598854e7f1a49506965f6804395c815150c9550eeaa017e862e5a306e61a1319
-
SSDEEP
384:xJfde4ojujuN1KisxnHB9NogEuuLiStgh:xJfde4rYN0giS6
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 4912 ringttek.exe -
resource yara_rule behavioral2/memory/1664-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0007000000023482-5.dat upx behavioral2/memory/1664-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4912-9-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ringtte.dll c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe File created C:\Windows\SysWOW64\ringttek.exe c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ringttek.exe c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ringttek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1664 wrote to memory of 4912 1664 c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe 84 PID 1664 wrote to memory of 4912 1664 c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe 84 PID 1664 wrote to memory of 4912 1664 c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe 84 PID 1664 wrote to memory of 2168 1664 c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe 98 PID 1664 wrote to memory of 2168 1664 c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe 98 PID 1664 wrote to memory of 2168 1664 c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\ringttek.exeC:\Windows\system32\ringttek.exe ˜‰2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118.exe.bat2⤵
- System Location Discovery: System Language Discovery
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5495d125168360cbfd98745cea5443fdf
SHA16a739f7f37a1623257f9cc1896fc5d71b6b2e891
SHA2569027d5deac1bb9474b624a58fc25b282f0586a0b9e0b4defc9f67c1df921a97f
SHA512ad45f1e8566f08657528285e7d7a473c03040d11545d9fd91d170d4759afc8696a97a15b4c5037537783fbe27bc932e6e2f9c53faec991c41b27249324ef5972
-
Filesize
12KB
MD5c28b048c1087a2c39d4b869fd952d6a0
SHA1d13971faa15d2da66ea67e8318ba1895c579d42d
SHA256dcb004958684cb218167a7193de22fbf98fab69b8d37cdf5260133fe667d501f
SHA51294f584f57ed53fc67ae181661b7f105c4506c7f0184942c889d498a8a3458fd2598854e7f1a49506965f6804395c815150c9550eeaa017e862e5a306e61a1319