Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe
-
Size
168KB
-
MD5
d3bc5b67a53b6d08886755aaa1df2da4
-
SHA1
c0d1a4b9d5bdcc7bb47ee0ca4324ec1c1f6dc801
-
SHA256
f76f53906f4af56d21e94820c5f263e83f7ad5b44b7a2fa75a33fb2aacf64fac
-
SHA512
fb6371c75aded502d5bbfb5ec72b5b558a947b4958922853dd9ba71c3c2e6198f2da41fd979b0d846a804646bbf252a02b011e82a9780cacfb23de2cc471828d
-
SSDEEP
3072:QwjmK0lZmJLSIfQy4ueKep31ndyp6W6RLeYwAEc9Z7XTadCoz79EFWFMqE8:QbNhI4y4ueK63VdI6W6RLfTEG70CozYs
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2744 keygen.exe 2892 ic1.exe -
Loads dropped DLL 6 IoCs
pid Process 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 2744 keygen.exe 2744 keygen.exe 2744 keygen.exe 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0008000000016307-3.dat upx behavioral1/memory/2316-4-0x0000000000F40000-0x0000000000FA0000-memory.dmp upx behavioral1/memory/2744-15-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2892-25-0x00000000004B0000-0x0000000000530000-memory.dmp upx behavioral1/memory/2744-30-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-31-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-33-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-34-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-35-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-36-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-37-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-38-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-39-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-40-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-41-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-42-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-43-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-44-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2744-45-0x0000000000400000-0x0000000000460000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2744 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2744 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2744 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2744 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2744 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2744 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2744 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2892 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2892 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2892 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2892 2316 d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3bc5b67a53b6d08886755aaa1df2da4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\nsj8A19.tmp\keygen.exe"C:\Users\Admin\AppData\Local\Temp\nsj8A19.tmp\keygen.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\nsj8A19.tmp\ic1.exe"C:\Users\Admin\AppData\Local\Temp\nsj8A19.tmp\ic1.exe"2⤵
- Executes dropped EXE
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5b64b538899d4588a05d7d3db92918448
SHA1b2d0b29a9c69bac6b22f696474eb031cca664f9a
SHA256803abec016d53636f2817c972f2c769beb36501fc8bd30c73994958eb94cfb29
SHA512ba4732c7a25dfdd636009a5ec8597e233c7c2b736b9c08a07dce13de70d9e0e08652b7f323ab590a29b57da12bf6a347675b2103bdfef06a80dbfd555ad09727
-
Filesize
125KB
MD58e9081cbbbe09c181fd16eeab67ddf6d
SHA125c7e8464f51d3ee511ba059d446b27004734562
SHA25641fc5e08dad9818b2e6e815c3672a9554776207c40a441625aa39c8374e95569
SHA512b99387681d1b0c9a23cd81589268da7406b0cf29f47847a125f444198cb588c7bae738c0aea34342419feff0805ae19259ffa0917f46ac8437c3cb2e97b58ada