Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe
-
Size
24KB
-
MD5
da74493f8fad6f50e18ae78950999395
-
SHA1
85e415894ab322ebad4adc1b5fca03b8b2dcbf4f
-
SHA256
1905f7af8e0abd07833d26f83e85545db7d1503b30562b1de7a31ce27d617206
-
SHA512
5792b32854d9d01ab67ae95138438cc1cf64d9c879c45d2e4e52e1d0fdca12bcd6480b33fc860b79e11dd83d30e73ddb19f1909a6c18287072a1c5a63a423e8c
-
SSDEEP
384:PezFlezFH3IUIuzcgcAepKLxvQZuF2LJbEUzNvFCqShvJaodJBDjw2pjBggfKZSv:Wz6zeozFiAxvQZuGJbEkFERhw2FXfVv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2284 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1948 msiecfg.exe -
Loads dropped DLL 2 IoCs
pid Process 2572 da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe 2572 da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IEXPLORER = "C:\\Windows\\system32\\msiecfg.exe" da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msiecfg.exe da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msiecfg.exe da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiecfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2572 wrote to memory of 1948 2572 da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe 30 PID 2572 wrote to memory of 1948 2572 da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe 30 PID 2572 wrote to memory of 1948 2572 da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe 30 PID 2572 wrote to memory of 1948 2572 da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe 30 PID 1948 wrote to memory of 2340 1948 msiecfg.exe 31 PID 1948 wrote to memory of 2340 1948 msiecfg.exe 31 PID 1948 wrote to memory of 2340 1948 msiecfg.exe 31 PID 1948 wrote to memory of 2340 1948 msiecfg.exe 31 PID 2572 wrote to memory of 2284 2572 da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe 32 PID 2572 wrote to memory of 2284 2572 da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe 32 PID 2572 wrote to memory of 2284 2572 da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe 32 PID 2572 wrote to memory of 2284 2572 da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da74493f8fad6f50e18ae78950999395_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\msiecfg.exeC:\Windows\system32\msiecfg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\program files\internet explorer\iexplore.exe"c:\program files\internet explorer\iexplore.exe"3⤵PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\da74493f8fad6f50e18ae78950999395_JaffaCakes118.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404B
MD55d1e4c294e42962dbc803960acb5401e
SHA1a0a32bcca803c282c42b043659fed8aa6a8253f3
SHA25615f556fc5a5facb94e5d66d9870c5ceaa85be64297b13040c0b8b353de27117f
SHA51270376eb66233333021f0517e370a1445f4fbd6f911b1ea0f2516e381c023f988c0d86c75885244e3ef9e6da1d4520b54d60776c8151e0677d623c32b14cf7193
-
Filesize
24KB
MD5da74493f8fad6f50e18ae78950999395
SHA185e415894ab322ebad4adc1b5fca03b8b2dcbf4f
SHA2561905f7af8e0abd07833d26f83e85545db7d1503b30562b1de7a31ce27d617206
SHA5125792b32854d9d01ab67ae95138438cc1cf64d9c879c45d2e4e52e1d0fdca12bcd6480b33fc860b79e11dd83d30e73ddb19f1909a6c18287072a1c5a63a423e8c