Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe
-
Size
49KB
-
MD5
d563e6efd89a55e47abe3ebe2cb5dc68
-
SHA1
9fa8b8452882692d3498c8727369c422434f687e
-
SHA256
4f1451a1cd63567ceca49118d5b0e9bbb11a28d16aa5b373d42fe861b924a776
-
SHA512
3a2896d3271d3c33762d468922e4dd277059d2a1dcf95f930324e3d74a183d0b6e546280b245e9430491025ea4faf2e9a2d2d240787d2e12dc8f32459ab827c4
-
SSDEEP
768:9FOvFOTl3IFOs8a1exNvilQghg3upkl160dTdcEnLKjQG111yfsP7:msh7smTvS3+6gnmMQcfsP7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2212 WinRoot32.e -
Loads dropped DLL 2 IoCs
pid Process 1620 d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe 1620 d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinRoot32.e d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2212 WinRoot32.e 2212 WinRoot32.e -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1620 d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2212 1620 d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2212 1620 d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2212 1620 d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2212 1620 d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe 30 PID 2212 wrote to memory of 1188 2212 WinRoot32.e 21 PID 2212 wrote to memory of 1188 2212 WinRoot32.e 21 PID 2212 wrote to memory of 1188 2212 WinRoot32.e 21 PID 2212 wrote to memory of 1188 2212 WinRoot32.e 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d563e6efd89a55e47abe3ebe2cb5dc68_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\WinRoot32.eC:\Windows\system32\WinRoot32.e3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD530fa0863a0884df88f2ddaadfe2dda56
SHA1233686f4f651ad0e1d2160c3e0a8986e6f3d2002
SHA256fa3761d1c70b38e1bdc2d1cae2445536f7d04acfd3645fcbe1d2c322dc1a9547
SHA51208bc09366533187c95ad5560457069ef7fba485082eae98687ed0806c71a542b269d1e1aac69840507003c216424574111336672ab3aac3a68797e2bd603bdbb