Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 07:45
Behavioral task
behavioral1
Sample
d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe
-
Size
549KB
-
MD5
d3df767ae2a8e47f27e321412d154b47
-
SHA1
32e06fc79620e9d880038347be91f58209bbc66e
-
SHA256
7b14fa612e8f39e725d1d98ecbfe88b777a083c0dce9a82f4bb7ffaec0343862
-
SHA512
5d588c6511f19318ce260d96b213dd966377079180e1c4ab7bf37c658ed7408bc3d905d2ec0efd6e6b6921b8d9b65acf1c143e1cfcfd1863754add95d306db98
-
SSDEEP
12288:qFgnKwoB2Kzh88hTVv9+emdDLPGKPnE5FXQ:q6noYKhxhpVrmdfGKvAXQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1696 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1664 RavM0nd.exe -
Loads dropped DLL 2 IoCs
pid Process 2052 d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe 2052 d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2052-0-0x0000000000400000-0x00000000005007FC-memory.dmp upx behavioral1/files/0x0009000000012286-4.dat upx behavioral1/memory/2052-10-0x0000000003230000-0x0000000003331000-memory.dmp upx behavioral1/memory/2052-23-0x0000000000400000-0x00000000005007FC-memory.dmp upx behavioral1/memory/1664-26-0x0000000000400000-0x00000000005007FC-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RavM0nd = "C:\\Windows\\system32\\RavM0nd.exe" d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\RavM0nd = "C:\\Windows\\system32\\RavM0nd.exe" d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\RavM0nd = "C:\\Windows\\system32\\RavM0nd.exe" d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RavM0nd = "C:\\Windows\\system32\\RavM0nd.exe" RavM0nd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\RavM0nd = "C:\\Windows\\system32\\RavM0nd.exe" RavM0nd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\RavM0nd = "C:\\Windows\\system32\\RavM0nd.exe" RavM0nd.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RavM0nd.exe RavM0nd.exe File created C:\Windows\SysWOW64\RavM0nd.exe d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\RavM0nd.exe d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe File created C:\Windows\SysWOW64\Deleteme.bat d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RavM0nd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1664 RavM0nd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1664 2052 d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe 28 PID 2052 wrote to memory of 1664 2052 d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe 28 PID 2052 wrote to memory of 1664 2052 d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe 28 PID 2052 wrote to memory of 1664 2052 d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe 28 PID 2052 wrote to memory of 1696 2052 d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe 29 PID 2052 wrote to memory of 1696 2052 d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe 29 PID 2052 wrote to memory of 1696 2052 d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe 29 PID 2052 wrote to memory of 1696 2052 d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3df767ae2a8e47f27e321412d154b47_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\RavM0nd.exeC:\Windows\system32\RavM0nd.exe /HuiFSetup2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD568dddbac3ce02c2b6a3f3b10868dfa85
SHA13ebdad74b1ed8b6b412f207c5daad080a4a09a2f
SHA256192c719feba50928eff7b2ff59fa99cc1e38f5bef047ac11986be5d809fa0155
SHA512e54bbbcd15c34e43141fac4a45c252543f36b1c536c86b720f10f12fb76b1ffa7829c46af2736a63fa911af25799bac948d259aedbe210a6ab043e0d24e4660e
-
Filesize
549KB
MD5d3df767ae2a8e47f27e321412d154b47
SHA132e06fc79620e9d880038347be91f58209bbc66e
SHA2567b14fa612e8f39e725d1d98ecbfe88b777a083c0dce9a82f4bb7ffaec0343862
SHA5125d588c6511f19318ce260d96b213dd966377079180e1c4ab7bf37c658ed7408bc3d905d2ec0efd6e6b6921b8d9b65acf1c143e1cfcfd1863754add95d306db98