Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe
-
Size
412KB
-
MD5
c924c23a17b75b158705d3162abf60d6
-
SHA1
9792f221e7b8d695595eb62883493fa84b6f20f6
-
SHA256
790cc74c6428ef3dfbfc6132c2a1305e456dead806a5f92ce1e3bb3bf6f5734a
-
SHA512
2786c9288a638fe4150387f93fedd0e606002060f84a3c88e61a327c2666dac128b4945a4b345a21e524b16bd5a673de0b9bef8a7dd24a1a0b5925d021f28531
-
SSDEEP
6144:gkx15x6uh/YSqD3LzGONaB3WLsW3NVhxMEmW5WvRUN2/k+4jML+GbSzIV15:Fnh/YTzfGONWQb3ZxMEZ5Wv2ek+4M7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1460 that.exe -
Loads dropped DLL 2 IoCs
pid Process 3068 c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe 3068 c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\program files\ReAlplay\games\that.exe c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language that.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3068 c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe 3068 c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe 3068 c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe 3068 c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe 1460 that.exe 1460 that.exe 1460 that.exe 1460 that.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1460 3068 c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe 30 PID 3068 wrote to memory of 1460 3068 c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe 30 PID 3068 wrote to memory of 1460 3068 c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe 30 PID 3068 wrote to memory of 1460 3068 c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c924c23a17b75b158705d3162abf60d6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\program files\ReAlplay\games\that.exe"c:\program files\ReAlplay\games\that.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD579499910dfed47005c6c583eeb031787
SHA15755d0fc4dfd266d73813d57de31694077938e36
SHA256146f38f1414f9f30d0959bd08997e37755abc4af836ef029d52682dde5ce3d4f
SHA512dab216523e21457e57f57995d36d25abda7404c0072bce8c66eb5240fa5eba4bd57fc17f3bd04d420dc8d164954c0ffc769f208e28bf78e8930b75481520e7a9