Analysis
-
max time kernel
30s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 04:34
Static task
static1
Behavioral task
behavioral1
Sample
ca36a9ecdbada706349c34010c712ba1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ca36a9ecdbada706349c34010c712ba1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ca36a9ecdbada706349c34010c712ba1_JaffaCakes118.exe
-
Size
184KB
-
MD5
ca36a9ecdbada706349c34010c712ba1
-
SHA1
9faa380d4c466c3ecc90e5dbad8dcff3b981c8b0
-
SHA256
0ab88bc2162738071d183ca69e312e62881c07d9aea2118c48a884e855127f4f
-
SHA512
87901e59682a6215e7f17a9a1012e338e1dcadb0fc26f7e45122846989cccdb4b2f4624cc0ec1695bed96e2befad6819c8acd4d912ca72bb420c6fafff1013cd
-
SSDEEP
3072:FKBYqKA1fjID6YxDrpuboYuooDwRiZhRI99FpRmB99:kBxpm6UcojZh6rE
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\svflooje.exe ca36a9ecdbada706349c34010c712ba1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 svflooje.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\keys.ini ca36a9ecdbada706349c34010c712ba1_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2376 2208 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svflooje.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2376 2208 svflooje.exe 30 PID 2208 wrote to memory of 2376 2208 svflooje.exe 30 PID 2208 wrote to memory of 2376 2208 svflooje.exe 30 PID 2208 wrote to memory of 2376 2208 svflooje.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca36a9ecdbada706349c34010c712ba1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ca36a9ecdbada706349c34010c712ba1_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
PID:2328
-
C:\Windows\SysWOW64\drivers\svflooje.exeC:\Windows\SysWOW64\drivers\svflooje.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 2002⤵
- Program crash
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5ca36a9ecdbada706349c34010c712ba1
SHA19faa380d4c466c3ecc90e5dbad8dcff3b981c8b0
SHA2560ab88bc2162738071d183ca69e312e62881c07d9aea2118c48a884e855127f4f
SHA51287901e59682a6215e7f17a9a1012e338e1dcadb0fc26f7e45122846989cccdb4b2f4624cc0ec1695bed96e2befad6819c8acd4d912ca72bb420c6fafff1013cd