Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe
-
Size
20KB
-
MD5
d14ccb6207dc61ebc415ccb3ec904ead
-
SHA1
d7f25bc233b3dabf65823f902f59230039ce2c88
-
SHA256
96a9ec32104f3cf3445d5a6949211052018461979032c4df9efd23c13f2c3737
-
SHA512
239560b6a759b9c0513af7756fcf482d4fe343c58f741bf91629a87dce16c6a38f935cdb5206a0745a88d8bceba963217bd09e3c2fce54e5c83c6991941088be
-
SSDEEP
384:+QQZtKPcHHCCKZeTXXOq2nHeWYg63Fj+GpRIoRvmNua:+v/KLlwX+WWYRswZvm1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2552 cmd.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\wins\svchost.exe d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ctfmon.exe cmd.exe File created C:\Windows\SysWOW64\ctfmon.exe cmd.exe File created C:\Windows\SysWOW64\dllcache\ctfmon.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2028 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2552 2348 d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2552 2348 d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2552 2348 d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2552 2348 d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2028 2552 cmd.exe 32 PID 2552 wrote to memory of 2028 2552 cmd.exe 32 PID 2552 wrote to memory of 2028 2552 cmd.exe 32 PID 2552 wrote to memory of 2028 2552 cmd.exe 32 PID 2552 wrote to memory of 1184 2552 cmd.exe 33 PID 2552 wrote to memory of 1184 2552 cmd.exe 33 PID 2552 wrote to memory of 1184 2552 cmd.exe 33 PID 2552 wrote to memory of 1184 2552 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d14ccb6207dc61ebc415ccb3ec904ead_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\delrunme.bat2⤵
- Deletes itself
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\ipconfig.exeipconfig3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2028
-
-
C:\Windows\SysWOW64\ctfmon.exeC:\Windows\system32\ctfmon.exe3⤵
- System Location Discovery: System Language Discovery
PID:1184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412B
MD5cc5f578468e4601da76457e4ecbb978b
SHA188e700a81c97c27f7f1ff323f580fb6524875772
SHA25676cf4cf74be1d5aca5edbb3de43e75357a0e035dd6155973090291ef9ac067d4
SHA512042e396a976abadfe0aae6d1b4d1c4aa62a5d7fc13558cbf66be999f1c6a5faea589f7db2c4268e021d97bd816bae2c6a68195e94851f81a00ad4ef9212a3631