Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 21:43
Behavioral task
behavioral1
Sample
d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe
-
Size
31KB
-
MD5
d91559ae45b8f9bc903d27703211b119
-
SHA1
f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
-
SHA256
b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
-
SHA512
3b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af
-
SSDEEP
768:4R+ulCa/bIJlC2tsR/xRYDV31iVYiuyfF8s:4RtF/ohsR5ahT
Malware Config
Extracted
buer
https://java-stat.com/
https://installerr.pw/
Signatures
-
resource yara_rule behavioral2/files/0x000700000002340d-2.dat buer behavioral2/memory/2216-5-0x0000000000CD0000-0x0000000000CDB000-memory.dmp buer behavioral2/memory/1884-6-0x000000003F820000-0x000000003F82B000-memory.dmp buer behavioral2/memory/2216-7-0x0000000000CD0000-0x0000000000CDB000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1884 manager.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" secinit.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secinit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 secinit.exe 2216 secinit.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1884 2252 d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe 83 PID 2252 wrote to memory of 1884 2252 d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe 83 PID 2252 wrote to memory of 1884 2252 d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe 83 PID 1884 wrote to memory of 2216 1884 manager.exe 84 PID 1884 wrote to memory of 2216 1884 manager.exe 84 PID 1884 wrote to memory of 2216 1884 manager.exe 84 PID 1884 wrote to memory of 2216 1884 manager.exe 84 PID 1884 wrote to memory of 2216 1884 manager.exe 84 PID 1884 wrote to memory of 2216 1884 manager.exe 84 PID 1884 wrote to memory of 2216 1884 manager.exe 84 PID 1884 wrote to memory of 2216 1884 manager.exe 84 PID 1884 wrote to memory of 2216 1884 manager.exe 84 PID 1884 wrote to memory of 2216 1884 manager.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\d91559ae45b8f9bc903d27703211b119_JaffaCakes118.exe" ensgJJ2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5d91559ae45b8f9bc903d27703211b119
SHA1f1b02bf6d06cfba37bfea3a5fdc0664cd7b8b91a
SHA256b73e52768067d97464a6991027693246fad1afb144cbf9c9e66ffc840cc8542e
SHA5123b048d58c7024a7d0ca78b0ffc2ec066bb4712082f8f33fd1aa853fc0ba37d207825be8517e57f548852c6bc2681a16196f7ddfd0dd792d2cb69a21afaa564af