Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe
-
Size
48KB
-
MD5
d2a2d346c3f95fd5c665a690fbc22fd2
-
SHA1
5f939f9df715b67abaa8745ce09b2ce31714b26a
-
SHA256
29ac91d03d6971bcf951213053bab1b0b0fdd4c6866fd77207d755946df89ea5
-
SHA512
e4d8e6dfffe021463830bb8155bce02c32bce54f5be8a6fd19916a65cb479a03b7e5959a96d35f3dc232ef3c1dcdad3c6fe87623b67036299d79d6fd8bfcd733
-
SSDEEP
768:MGwPm0l5w8JpATn6bKo2B+LxVYIMXxa9M:MY04gGTK2wLxVZMha9M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2188 PELoader.exe -
Loads dropped DLL 9 IoCs
pid Process 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 2652 WerFault.exe 2652 WerFault.exe 2652 WerFault.exe 2652 WerFault.exe 2652 WerFault.exe 2652 WerFault.exe 2652 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\PELoader.exe d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1868 set thread context of 2188 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2652 2188 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PELoader.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2188 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2188 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2188 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2188 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2188 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2188 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2188 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2188 1868 d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2652 2188 PELoader.exe 31 PID 2188 wrote to memory of 2652 2188 PELoader.exe 31 PID 2188 wrote to memory of 2652 2188 PELoader.exe 31 PID 2188 wrote to memory of 2652 2188 PELoader.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2a2d346c3f95fd5c665a690fbc22fd2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\PELoader.exeC:\Windows\system32\PELoader.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 363⤵
- Loads dropped DLL
- Program crash
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD517bfd0728830088e554ba395141371e9
SHA1b40d4c2c3732bc6774294fdad338ac1fc4ea23e3
SHA2563c155cbf98c2b37d41079b7b58f13d05820ec5dd1b37693aa246a205d1f3a54b
SHA5122176298aae9e4c4b3ad8245a90e426c6ebb24ce7d49f638979d1ae19d5680896d894a71c19690acafa77736071c339885d49466d91e81ea1190e5b8ed2f7d122