Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
db83044597e2b12bd8cf9a12d4870cce
-
SHA1
ead58ccb73af8b47bcdce50eb43525d3d5aea65e
-
SHA256
9b3acae6a6738003aa758af3e6a7c17164fb8f97b83df395a06d74e642db6992
-
SHA512
f61071eee3c48ac15769f8f850cb7eddf0dc47b9ca4a281cdc0af81b72bc5190099d01b126145d1a1ed0e5c7e3b33878d0a81b1d038372e44fa356db281cd8ea
-
SSDEEP
24576:uUZVeIOWJRH814FaLwNAQUQjC05y37G9vH9XimKJY85iMUEIs7YuPCp7Bb/W/+lU:uUZgduRutLwOcjCD36f9XimKJYGtTap4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1936 D.exe -
Loads dropped DLL 3 IoCs
pid Process 2840 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 2840 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 1936 D.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\COMCTL32.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvcrt.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File created C:\Windows\SysWOW64\msvcrt.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\VERSION.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File created C:\Windows\SysWOW64\VERSION.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ADVAPI32.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File created C:\Windows\SysWOW64\ADVAPI32.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\COMCTL32.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 D.exe 1936 D.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1936 2840 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 29 PID 2840 wrote to memory of 1936 2840 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 29 PID 2840 wrote to memory of 1936 2840 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 29 PID 2840 wrote to memory of 1936 2840 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 29 PID 2840 wrote to memory of 1936 2840 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 29 PID 2840 wrote to memory of 1936 2840 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 29 PID 2840 wrote to memory of 1936 2840 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 29 PID 1936 wrote to memory of 1388 1936 D.exe 20 PID 1936 wrote to memory of 1388 1936 D.exe 20 PID 1936 wrote to memory of 1388 1936 D.exe 20 PID 1936 wrote to memory of 1388 1936 D.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD57efc387017221960ae741fb41186c3ed
SHA19e7ee2862559f0387b5995fce5a2c9819b9cdecf
SHA2561dcbf21d4b5195c84e8776ef179c9d74c7f2f55fef3300ca841b634a722e3ede
SHA51231845d75fb72514f59c637138af45d1adc6e7b1f5a02ecb86aa8c8d94f0c5cc47ccf1fd54522aa3e9d0293415a581252c394ce17d44b3044a5480f12af01e0ed