Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 21:43
Behavioral task
behavioral1
Sample
d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe
-
Size
31KB
-
MD5
d91559ae45b8f9bc903d27703211b119
-
SHA1
f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
-
SHA256
b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
-
SHA512
3b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af
-
SSDEEP
768:4R+ulCa/bIJlC2tsR/xRYDV31iVYiuyfF8s:4RtF/ohsR5ahT
Malware Config
Extracted
buer
https://java-stat.com/
https://installerr.pw/
Signatures
-
resource yara_rule behavioral1/files/0x0008000000018c34-3.dat buer -
Deletes itself 1 IoCs
pid Process 2108 manager.exe -
Executes dropped EXE 1 IoCs
pid Process 2108 manager.exe -
Loads dropped DLL 2 IoCs
pid Process 2100 d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe 2100 d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language manager.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2108 2100 d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2108 2100 d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2108 2100 d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2108 2100 d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe 31 PID 2108 wrote to memory of 2284 2108 manager.exe 32 PID 2108 wrote to memory of 2284 2108 manager.exe 32 PID 2108 wrote to memory of 2284 2108 manager.exe 32 PID 2108 wrote to memory of 2284 2108 manager.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe" ensgJJ2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵PID:2284
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5d91559ae45b8f9bc903d27703211b119
SHA1f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
SHA256b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
SHA5123b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af