Analysis
-
max time kernel
143s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe
-
Size
7.9MB
-
MD5
dd9d52ad60f036f01386d4b4c3335abd
-
SHA1
e8c1a07684657dc50d95fbdb1bcace463f712c3b
-
SHA256
08e1d339e37939311ac6879480b15bde289fb367f062988bb6f571d3e0119863
-
SHA512
d7e9e0835767001be734127f45f23f9cba368e598254d3011ce6a47cfa7ce01423434087d03fc602ebafd82a87a1930cd7687736a05a1dcfcd3377e24d128ea8
-
SSDEEP
196608:XCdQKcYC/jrbGK27r5HqUSWLQUBTaXMkbEjE990e9sq+:aNC//bG/E4Y8kb3Pk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2500 explorer.exe 2420 iexplore.exe -
Loads dropped DLL 4 IoCs
pid Process 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2420 iexplore.exe 2420 iexplore.exe 2420 iexplore.exe 2420 iexplore.exe 2500 explorer.exe 2500 explorer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2500 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2500 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2500 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2500 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2420 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 31 PID 1972 wrote to memory of 2420 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 31 PID 1972 wrote to memory of 2420 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 31 PID 1972 wrote to memory of 2420 1972 dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2940 2500 explorer.exe 32 PID 2500 wrote to memory of 2940 2500 explorer.exe 32 PID 2500 wrote to memory of 2940 2500 explorer.exe 32 PID 2500 wrote to memory of 2940 2500 explorer.exe 32 PID 2420 wrote to memory of 1920 2420 iexplore.exe 35 PID 2420 wrote to memory of 1920 2420 iexplore.exe 35 PID 2420 wrote to memory of 1920 2420 iexplore.exe 35 PID 2420 wrote to memory of 1920 2420 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd9d52ad60f036f01386d4b4c3335abd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe" --mn=02⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\28123.bat"3⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
-
C:\Users\Admin\AppData\Local\Temp\iexplore.exe"C:\Users\Admin\AppData\Local\Temp\iexplore.exe" --mn=0 --ch=12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\28567.bat"3⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD5f64d4f7072c47d3a96ec66c8fd7d6c9c
SHA14415f795c33ae02fbe8fe403a81dd3c3be3dbd22
SHA25645467a17d69abb5c42ba48cb17a0b390280a4234c032f7843b1d5ba2e3c99aab
SHA512701cc047b1d7e7e38b54112f49a1f5b9036da60ff13a4a3986c78385519c426a08e7bf188abe4eb7df91bc0146be0195e8c005d63cdf4a7abc8bffdc3f89288e
-
Filesize
183B
MD57236aae19164f35637106a8cf83d92da
SHA1e4d20deeec6d8a76659c591c7596ea98581420d6
SHA256e690eace61b67c3f6bb8849a88060e6942f3ee294d0d9b64bda0a2b6ecc0df47
SHA512c0c8dae6c92045a5167024d10183af22189aae7787d59ce274b0388bf6fb3cb52029b1f58927c013e2373b5ebd3071247ec7b0e3964c13e42efcc9b1a875c888
-
Filesize
7.9MB
MD5dd9d52ad60f036f01386d4b4c3335abd
SHA1e8c1a07684657dc50d95fbdb1bcace463f712c3b
SHA25608e1d339e37939311ac6879480b15bde289fb367f062988bb6f571d3e0119863
SHA512d7e9e0835767001be734127f45f23f9cba368e598254d3011ce6a47cfa7ce01423434087d03fc602ebafd82a87a1930cd7687736a05a1dcfcd3377e24d128ea8