Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe
-
Size
9KB
-
MD5
e0412c47c09f4a83204613b30f6c7862
-
SHA1
52974f76a7001396cf2acb9f8d67753a513d9106
-
SHA256
4b9908934a7fd095db727b9ee19471ff2d5dc64a5a146e875410d142db4d6f87
-
SHA512
70884673b819c49e524b0f2278ea24b84b14642cc5bbd5fb155eed71e326da8b6754edd38abf5caeadc7e6ad732360c2bd4b27b9caaff4889f12c373708ef563
-
SSDEEP
192:UAhUJOeBfmrRlTf5nATOSQKEPRDsjnhVIFHaPFA:UAhU4FVj5Dsjnh0v
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\midimaptl = "{4F4F0064-71E0-4f0d-0017-708476C7815F}" e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2096 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 3024 e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\midimaptl.tmp e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\midimaptl.tmp e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\midimaptl.dat e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0017-708476C7815F} e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0017-708476C7815F}\InProcServer32 e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0017-708476C7815F}\InProcServer32\ = "C:\\Windows\\SysWow64\\midimaptl.dll" e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0017-708476C7815F}\InProcServer32\ThreadingModel = "Apartment" e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3024 e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3024 e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2096 3024 e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2096 3024 e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2096 3024 e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2096 3024 e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0412c47c09f4a83204613b30f6c7862_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\E753.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5c46ade2fae3cf55cc6e7da38e3b14c3b
SHA12773a18fa672c7aecfbc1876a7db5cecb5e63478
SHA25680e42186fd4792b55abcbf065a3bd56a1550c0c3f54f0de4fa8fefaa4174cb18
SHA512877ce8eec0a7db59fd583243c421b7b03650bdbe1deb05b051c8afb0b1629a492f028a6fa5beca4e7962e123d6ae3bc5f4e929762261e77060e9f41a500ebe7f
-
Filesize
1.0MB
MD5c56e739fd01201e05cb5609ae1c8c2ae
SHA1b52a5d2d093f794aff3d336b6fb1ad2e259e1d7f
SHA256405baa8438789d3d86cfd46cfeefe7d5d544164f46a5403430e6d1320515209c
SHA5120d072ac3505f10199c14941000353d2af29e5f4c7f16a2bbf8fd1d70b47d04f17ed9ffaa7197d0ba76ff0503e44f0c2b90f704fff4cdd93c5da16b13f6b7a347