Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe
-
Size
300KB
-
MD5
d3e6e4ea2df1904d06e3ebeeb17ccd40
-
SHA1
20e1f9db391c1f02ff767b93553115e04ddc4958
-
SHA256
8a534c1dfd89e012cffdc73dff2d306604b3732f063f3b71ab0c6a2fe4da7939
-
SHA512
4d0c96a583d371fa36d1ac89c396ca5acc0f88d346432bdd98a11402f1376c8985d4616f994fed68062bbb53b7205dde5bbff313a8c9cc3fcd7d0d53da33ef68
-
SSDEEP
6144:NxMRpc+qaGqqCG6K3SYdHlBUovmvgPNkVsuaRaU6mHG1thpj:PM3qUEWgV0aRz6mHG1tjj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2672 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2688 doodle1.exe -
Loads dropped DLL 2 IoCs
pid Process 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\win.com d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\doodle1.exe doodle1.exe File created C:\Windows\SysWOW64\doodle1.exe doodle1.exe File opened for modification C:\Windows\SysWOW64\doodle1.exe.bat d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\doodle1.exe d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe File created C:\Windows\SysWOW64\doodle1.exe d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doodle1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe 2688 doodle1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2688 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2688 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2688 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2688 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2672 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2672 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2672 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2672 2488 d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3e6e4ea2df1904d06e3ebeeb17ccd40_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\doodle1.exeC:\Windows\system32\doodle1.exe 12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\doodle1.exe.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5d3e6e4ea2df1904d06e3ebeeb17ccd40
SHA120e1f9db391c1f02ff767b93553115e04ddc4958
SHA2568a534c1dfd89e012cffdc73dff2d306604b3732f063f3b71ab0c6a2fe4da7939
SHA5124d0c96a583d371fa36d1ac89c396ca5acc0f88d346432bdd98a11402f1376c8985d4616f994fed68062bbb53b7205dde5bbff313a8c9cc3fcd7d0d53da33ef68
-
Filesize
209B
MD52a05c8f5976fa7bb6f69a8835b653479
SHA1cb25ec2630d176360974738b72d9c608ff67475c
SHA2567a78991fdba87bee8ca2aefdcbce5aaca701a4cb49e06ea57c83b91a787f1e94
SHA51260f521b8d5965f2315f908f8ecdff1f603362f7a0e2079f99523fad3d5303edbfc77bbc48f971ba12a78261fcfc68073f2b81c741de288d787e94df5ac8c1235