Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 11:28
Static task
static1
Behavioral task
behavioral1
Sample
de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe
-
Size
53KB
-
MD5
de40381bfee2dd0a5004910f9c09de85
-
SHA1
3dc0d6e7eaa038ec9584f1fdab05290e13cc7955
-
SHA256
8d06ec26bcc0544ae8e0548497a1da353b0b4f3bc6df25c6c023958bfe57283c
-
SHA512
c69b052c8fa291cfde48841aee72c4e30e2089292ddbdf8989591385d820a0436ec2b9664729e2807c00b9d2c6274f7bbda13b192044de600eb659da315ec6f2
-
SSDEEP
1536:ecaHYt9g7qWmCUAbVxWcOZoDmR26Q9uZps4wSukwdzE:e74vg7qWmCnvNOZoDh6r6SrCzE
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00080000000173c2-5.dat vmprotect -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mshtml.dll.mod de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe File created C:\Windows\SysWOW64\mshtml.dll.mod de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mshtml.dll de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\DllCache\mshtml.dlldHKjm de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\DllCache\mshtml.dll de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mshtml.dlldHKjm de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\dHKjm.LOG de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe File opened for modification C:\Windows\system\dHKjm.LOG de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2200 1672 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1672 de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe 1672 de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2200 1672 de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2200 1672 de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2200 1672 de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2200 1672 de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de40381bfee2dd0a5004910f9c09de85_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 1322⤵
- Program crash
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b7264717fb42b1cd5aa69d33290fe6e0
SHA1e29fa6d7cf887aff86f9155bcf4ed7255b0e3420
SHA25688b8a3cc4ec068e396143b4ef46012af5ec143a9693631a2ce37fadb37b7691a
SHA51254dcace09c8374cddbf15ff660e0df1d08717c1132a2cbe837906df75fde4395fcd0c5136ed3bfdea77369f8f4c403cc5b6805281990ab4aeefb241766e32b0a