Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 22:46
Behavioral task
behavioral1
Sample
d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe
-
Size
236KB
-
MD5
d539e4b7aea67336ca48a392afdc3fd2
-
SHA1
61732f7194c42caf5b36dea45ffd3645fddf5d0c
-
SHA256
b49e5fbaa8098f98b5b994f6864bbdfd17273d7d00c0f498395a946f346ac180
-
SHA512
50d23125cfa428e827f96f6828c034ec753e493d848a7a1cc9ff954dafce354e0aaeacfed45af39da772030b5b22fc3a817e39dcce6750bf238991db1b0164f5
-
SSDEEP
3072:wd3cREC8N8FPumtOYKu9dKc6qWEDCi3fqnkSLiojrnsjPGePk1GN:wqLsEPfEYKQHjWWF3fqTLiojW7c1G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1244 OW32.exe -
Loads dropped DLL 5 IoCs
pid Process 3020 d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe 3020 d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe 2904 WerFault.exe 2904 WerFault.exe 2904 WerFault.exe -
resource yara_rule behavioral1/memory/3020-1-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/3020-3-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/files/0x0009000000016cfe-5.dat upx behavioral1/memory/3020-16-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/1244-15-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/3020-12-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/1244-20-0x0000000000400000-0x00000000004EE000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2904 1244 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OW32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1244 3020 d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe 30 PID 3020 wrote to memory of 1244 3020 d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe 30 PID 3020 wrote to memory of 1244 3020 d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe 30 PID 3020 wrote to memory of 1244 3020 d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe 30 PID 1244 wrote to memory of 2904 1244 OW32.exe 32 PID 1244 wrote to memory of 2904 1244 OW32.exe 32 PID 1244 wrote to memory of 2904 1244 OW32.exe 32 PID 1244 wrote to memory of 2904 1244 OW32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d539e4b7aea67336ca48a392afdc3fd2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\downloads\OW32.exe"C:\downloads\OW32.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 7443⤵
- Loads dropped DLL
- Program crash
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5d539e4b7aea67336ca48a392afdc3fd2
SHA161732f7194c42caf5b36dea45ffd3645fddf5d0c
SHA256b49e5fbaa8098f98b5b994f6864bbdfd17273d7d00c0f498395a946f346ac180
SHA51250d23125cfa428e827f96f6828c034ec753e493d848a7a1cc9ff954dafce354e0aaeacfed45af39da772030b5b22fc3a817e39dcce6750bf238991db1b0164f5