Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 14:29
Behavioral task
behavioral1
Sample
d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe
-
Size
134KB
-
MD5
d491fdea125fa1441c2a08c0ab3b7545
-
SHA1
8200981affa2c27ea02abcbaa21f3845d06b178d
-
SHA256
3646ed9c9fefca0d08e9c661a85adff49932d22fdbedf4217d0f6904e21b55df
-
SHA512
7256af7c4b8dc0f06a5385fe7bc3e607a8962f19e554b91d5947ec80be550fecae30c6be3e7d16edc031f32c7432719048ced0d3c1263e6424a04959c4b8f9c1
-
SSDEEP
3072:b6rFaxkvDIfkIU+gqBEniJV00ylr/bROHPK6:GrFWkLwhFOnQ00ypbMHP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3384 Irejia.exe -
resource yara_rule behavioral2/memory/1728-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000a00000002337b-7.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Irejia.exe d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe File opened for modification C:\Windows\Irejia.exe d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Irejia.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Irejia.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Irejia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main Irejia.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\International Irejia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe 3384 Irejia.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1728 wrote to memory of 3384 1728 d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe 88 PID 1728 wrote to memory of 3384 1728 d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe 88 PID 1728 wrote to memory of 3384 1728 d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d491fdea125fa1441c2a08c0ab3b7545_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\Irejia.exeC:\Windows\Irejia.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5d491fdea125fa1441c2a08c0ab3b7545
SHA18200981affa2c27ea02abcbaa21f3845d06b178d
SHA2563646ed9c9fefca0d08e9c661a85adff49932d22fdbedf4217d0f6904e21b55df
SHA5127256af7c4b8dc0f06a5385fe7bc3e607a8962f19e554b91d5947ec80be550fecae30c6be3e7d16edc031f32c7432719048ced0d3c1263e6424a04959c4b8f9c1
-
Filesize
390B
MD52816f0e456a6209f2b37085671de91cc
SHA15916a0c37da285cfd244bbc84a398aa263acc11c
SHA256e3213f9f033f839b0bbee4b3e485ac5927f51d9bd7e69447652d63f9779fdcd8
SHA5126c8d05400ed74803d5a40787faffda38f5a155ab8a12f5133f2794f2fcef0f0be219c9a0869541118663720e4ae9cded6aa274392ddc247e8284c33f17f08999