Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 11:06
Behavioral task
behavioral1
Sample
c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe
Resource
win7-20240704-en
7 signatures
150 seconds
General
-
Target
c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe
-
Size
35KB
-
MD5
c8b31591ccff657ffe923b007b63c8fc
-
SHA1
4763860986dbdfa3d0c46311438afaaffea5899e
-
SHA256
f0d3155732d3e0b366086cd2741ad160c47b7076f40668cd44160308cd3b8954
-
SHA512
3a37bbc4f0ec043b3e06db68066ba79f5f1ff6497d55025403a3baaff2768a3e0ab321e44b9b0aa3534c696cd6990ba1d907af0dbd92c552e0be4414a144f877
-
SSDEEP
768:lmef2VBnD2n279xDJuM5CWKOfv8LH4Aiop8MvDLhm:lvfWqn2XJdlhvKSMvDFm
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2296-0-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aaaaaaaa« = "C:\\Windows\\System32\\aaaaaaaa«.exe" c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\aaaaaaaa« = "C:\\Users\\Admin\\aaaaaaaa«.exe" c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\aaaaaaaa«.exe c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2296 set thread context of 604 2296 c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2216 604 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2296 wrote to memory of 604 2296 c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe 29 PID 2296 wrote to memory of 604 2296 c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe 29 PID 2296 wrote to memory of 604 2296 c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe 29 PID 2296 wrote to memory of 604 2296 c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe 29 PID 2296 wrote to memory of 604 2296 c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe 29 PID 2296 wrote to memory of 604 2296 c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe 29 PID 2296 wrote to memory of 604 2296 c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe 29 PID 2296 wrote to memory of 604 2296 c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe 29 PID 2296 wrote to memory of 604 2296 c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe 29 PID 604 wrote to memory of 2216 604 svchost.exe 30 PID 604 wrote to memory of 2216 604 svchost.exe 30 PID 604 wrote to memory of 2216 604 svchost.exe 30 PID 604 wrote to memory of 2216 604 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8b31591ccff657ffe923b007b63c8fc_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 604 -s 643⤵
- Program crash
PID:2216
-
-