Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
da13264695024739caf7bf6c552365e7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da13264695024739caf7bf6c552365e7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da13264695024739caf7bf6c552365e7_JaffaCakes118.exe
-
Size
104KB
-
MD5
da13264695024739caf7bf6c552365e7
-
SHA1
358635443cabc16d81c0162f835532780ea9213e
-
SHA256
e9806b22f51b828b7775f951fc862adbf3f52563ac675b0a51154778d65cc3f8
-
SHA512
79d4d0a7e81b4281507073aead3c9582d0c36cfaf8faee99d21d4293e1483e8fe25e46bcad56f79b415d44a6fb73e10d609990a7523795ea73abce61f695e82f
-
SSDEEP
3072:dS4NDMiqLJooQtwpvnyMqT/Mhtcgjt4EbhWbs4HoZm2TMrQuAnW:dS4NDMiqLJooQtwpvnyMqT/Mhtcgjt43
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3992 Finaldoom.EXE -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\7Z.EXE Finaldoom.EXE File opened for modification C:\PROGRAM FILES\7-ZIP\7ZFM.EXE Finaldoom.EXE File opened for modification C:\PROGRAM FILES\7-ZIP\7ZG.EXE Finaldoom.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 3232 1920 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da13264695024739caf7bf6c552365e7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Finaldoom.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3992 1920 da13264695024739caf7bf6c552365e7_JaffaCakes118.exe 83 PID 1920 wrote to memory of 3992 1920 da13264695024739caf7bf6c552365e7_JaffaCakes118.exe 83 PID 1920 wrote to memory of 3992 1920 da13264695024739caf7bf6c552365e7_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\da13264695024739caf7bf6c552365e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da13264695024739caf7bf6c552365e7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Finaldoom.EXE"C:\Users\Admin\AppData\Local\Temp\Finaldoom.EXE"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 2922⤵
- Program crash
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1920 -ip 19201⤵PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5d742d5e0404f446ae03309b28182896f
SHA1339550de0dedfc62594c9dc19e7687eb6b862f11
SHA2569c0f51fe770b9b848612d63be0445c36e60a58d11f84021ff2659995597c091f
SHA51242a6f013a2b8bfcfaf8676d720cf12276ccd15bc295950eca9a39df6807f56cc9e8876ba5d827f18909f8abaa523280648769f32a5b7d6fbdee5a2904050f3e0