Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 07:40
Behavioral task
behavioral1
Sample
d3dcfcb7016a8da409196db930be0bc7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d3dcfcb7016a8da409196db930be0bc7_JaffaCakes118.exe
-
Size
58KB
-
MD5
d3dcfcb7016a8da409196db930be0bc7
-
SHA1
db7b4fe5989227050b1f121f9d2569c2e0824f24
-
SHA256
de6344ab11ece616d86d4a0bcb70d89e2aa13d320cca13701255f42fa5501ab4
-
SHA512
b2fbad4ae0f8168d22364f554cce0a6ce0d98e1c5f75c90a4bfff3799fb142a0456c03e9c2d897bacd13235303b1e0e79271c0a45fe13172e970910c52c1451a
-
SSDEEP
1536:3PuwIMl7hQUfE4E5fxLVXF37B8FdxthIB3QL9ffPijdb12:3FNVfE4E5rFOF5hM3i3Kf2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1588 server.exe -
resource yara_rule behavioral2/memory/768-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/files/0x000900000002362a-4.dat upx behavioral2/memory/768-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1588-8-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\server.exe d3dcfcb7016a8da409196db930be0bc7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\server.exe d3dcfcb7016a8da409196db930be0bc7_JaffaCakes118.exe File created C:\Windows\SysWOW64\pshelp.dll d3dcfcb7016a8da409196db930be0bc7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3dcfcb7016a8da409196db930be0bc7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1588 wrote to memory of 512 1588 server.exe 91 PID 1588 wrote to memory of 512 1588 server.exe 91 PID 1588 wrote to memory of 512 1588 server.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3dcfcb7016a8da409196db930be0bc7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3dcfcb7016a8da409196db930be0bc7_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:768
-
C:\Windows\SysWOW64\server.exeC:\Windows\SysWOW64\server.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4048,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4460 /prefetch:81⤵PID:4136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5d3dcfcb7016a8da409196db930be0bc7
SHA1db7b4fe5989227050b1f121f9d2569c2e0824f24
SHA256de6344ab11ece616d86d4a0bcb70d89e2aa13d320cca13701255f42fa5501ab4
SHA512b2fbad4ae0f8168d22364f554cce0a6ce0d98e1c5f75c90a4bfff3799fb142a0456c03e9c2d897bacd13235303b1e0e79271c0a45fe13172e970910c52c1451a