Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe
-
Size
717KB
-
MD5
dbffdb476210d278e6f8ba1bbf6bf25c
-
SHA1
cbbdb709b49664dcb291c526c10d6450ce4e5dac
-
SHA256
a4cbe6c8132ece0824c88aec3f63ffd38b5f468028865542b3c057c66cd1e093
-
SHA512
b4f1e621e0c088e59f0a7b4711e09338874c8b98734e8651f8501c951102cf33e8f991b73338730e8525b9c98f22cb6ba0ee90eb937413aa39d384a48eda8350
-
SSDEEP
6144:bbVXmZfL3KXSapluBY6eC2VsJsG2CPRgcz9XbrE9N94xiI2XkIfroRD9evp5Y1fh:HVWZjYMYc2IgcxXbk6gXkSucch
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\~ETUPBLK.TMP dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1988 dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1988 wrote to memory of 288 1988 dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe 30 PID 1988 wrote to memory of 288 1988 dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe 30 PID 1988 wrote to memory of 288 1988 dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe 30 PID 1988 wrote to memory of 288 1988 dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe 30 PID 288 wrote to memory of 2508 288 iexplore.exe 31 PID 288 wrote to memory of 2508 288 iexplore.exe 31 PID 288 wrote to memory of 2508 288 iexplore.exe 31 PID 288 wrote to memory of 2508 288 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\internet explorer\iexplore.exe"C:\Program Files (x86)\internet explorer\iexplore.exe" "199.221.131.86/RequestHandler.ashx?MfcISAPICommand=installstatus¶m=%58%00%01%00B8RppShaXz16gIKuMoGx-IfyPxYe8uM2t_rQcjFZcp7laxkswjfgqGu7nfbthglynGY1LbqE6B-xpAE93uAsVHp3SYja7yWETqWe2MwLpXUjIi7A_MItAm"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" "199.221.131.86/RequestHandler.ashx?MfcISAPICommand=installstatus¶m=%58%00%01%00B8RppShaXz16gIKuMoGx-IfyPxYe8uM2t_rQcjFZcp7laxkswjfgqGu7nfbthglynGY1LbqE6B-xpAE93uAsVHp3SYja7yWETqWe2MwLpXUjIi7A_MItAm"3⤵PID:2508
-
-