Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe
-
Size
96KB
-
MD5
dea7175c95b0499e1bf1346ac742b064
-
SHA1
0d1900212b4fdc0f757d48074bd7a59d352b602b
-
SHA256
879d26445f5f2824577a9896c3eb69bace88399b646f7c2a4979888fc9e618d4
-
SHA512
ad99f32abc4602f156675d18c3510e5ece06a693c5fb4af7511fea181dbd4cbe256494407510e1bad1814ea4379b28415d1ff5d70c06d09e1cd81b817539e15d
-
SSDEEP
768:MmH1KwVE8BGacEvnb7vRHwEEEEEwERGq+kZoQ+vKdliXSVAFD/mjmH1KwLDXY+5J:l2KdlIBFZbXYQIt7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1028 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1568 dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vlihzouhgnfe.cfg dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vlihzouhgnfe.dll dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe File created C:\Windows\SysWOW64\vlihzouhgnfe.dll dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1568 dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe 1568 dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1028 1568 dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe 29 PID 1568 wrote to memory of 1028 1568 dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe 29 PID 1568 wrote to memory of 1028 1568 dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe 29 PID 1568 wrote to memory of 1028 1568 dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\dea7175c95b0499e1bf1346ac742b064_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD555c8d64789d37de12c6cffe6c1320f78
SHA1c9fd6d379a430a123a2271cefb30e496f4191cf5
SHA256d6079be2f73e086b556d43cd404945bc2663fe285b3cef94b552b0295b7ccf0a
SHA51221fa2d724bd0ebf89a82f5bbe0f221143066dd0af93f645be24743eebd221bcc1b726f37a32752c3cbc8e75ffe3fc4dc51020d199d35b72bd9df356d3aaab2c4