Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe
-
Size
53KB
-
MD5
dfdc581b11cca8c081aea554bf7ed24b
-
SHA1
f96b744a40694e5ad398967d874eea3dd4886a7c
-
SHA256
fd7a42fd9b8a3e1e6970a623d9c0e0057c37f7ff9764eab10730586716bc6fa6
-
SHA512
b79161eb08df69f5607702979039b5e44e587e35f1885a58d031a41de7c89b8864065a295b527c32543fdc6e0381e3605660ac1e881331b82bc46f0cb5a1c53b
-
SSDEEP
768:e8SAXx1gUzd9b5oY6YRxYv04BYnpMU4HBeWehgiJO2:eRAhOUzvdofYRxYv0sYnpMU4HBeWotJ9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 Htf4pT.exe -
Loads dropped DLL 5 IoCs
pid Process 2668 dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe 2668 dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2744 2788 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Htf4pT.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2668 dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2788 2668 dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe 31 PID 2668 wrote to memory of 2788 2668 dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe 31 PID 2668 wrote to memory of 2788 2668 dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe 31 PID 2668 wrote to memory of 2788 2668 dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe 31 PID 2788 wrote to memory of 2744 2788 Htf4pT.exe 32 PID 2788 wrote to memory of 2744 2788 Htf4pT.exe 32 PID 2788 wrote to memory of 2744 2788 Htf4pT.exe 32 PID 2788 wrote to memory of 2744 2788 Htf4pT.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfdc581b11cca8c081aea554bf7ed24b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Htf4pT.exe"C:\Users\Admin\AppData\Local\Temp\Htf4pT.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 363⤵
- Loads dropped DLL
- Program crash
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5bc366bf587db6d09888e7b19ac9b4087
SHA19c36e40761884c863aaa882bbfb9beb888c9625b
SHA256696dec1e77af20429f840f940aa059c4b09781e86cbeff665def8cd1157067f2
SHA512a138376d661075fcf9d32dbb0cf2b968ecb329b95a8642d7defb11b18505b411aa3825b841d42f548eb7acf3b90b6c0c7710714404032ca6ce7603837b82665a