Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe
-
Size
60KB
-
MD5
e0441cb9d3655ebba19f46928627a5c5
-
SHA1
6f6cc5c586692c5404b7d8d573d543d6b8a6e917
-
SHA256
760d11c4caf7e4b681a5c9d7d0bd1a1d84461ede1aae2dcd3efa068aff375e66
-
SHA512
cd759fda673563fca5e2727941a55651e12fb4edb7f4923092b4aaea91b18e474a2d5d6ec34f1888f46dee6e7dcc4c0b1cdf915b7db1053d25936f1364573772
-
SSDEEP
192:0un2X7cILCml7cAdzCaPSbe0okf0UZ5K34C1ZVVxYaInr5XCUKP9kgBwM:0uBIuI7hC+6/58TrynrjKPn/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2784 wmedia16.exe -
Loads dropped DLL 2 IoCs
pid Process 3020 e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe 3020 e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmedia16.exe wmedia16.exe File created C:\Windows\SysWOW64\wmedia16.exe e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmedia16.exe e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2872 PING.EXE 2740 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2740 PING.EXE 2872 PING.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2784 3020 e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2784 3020 e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2784 3020 e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2784 3020 e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2892 3020 e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2892 3020 e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2892 3020 e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2892 3020 e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2872 2892 cmd.exe 33 PID 2892 wrote to memory of 2872 2892 cmd.exe 33 PID 2892 wrote to memory of 2872 2892 cmd.exe 33 PID 2892 wrote to memory of 2872 2892 cmd.exe 33 PID 2892 wrote to memory of 2740 2892 cmd.exe 34 PID 2892 wrote to memory of 2740 2892 cmd.exe 34 PID 2892 wrote to memory of 2740 2892 cmd.exe 34 PID 2892 wrote to memory of 2740 2892 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0441cb9d3655ebba19f46928627a5c5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\wmedia16.exe"C:\Windows\system32\wmedia16.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2784
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\removeMe4538.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\PING.EXEping 0.0.0.03⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2872
-
-
C:\Windows\SysWOW64\PING.EXEping 0.0.0.03⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253B
MD5b42996ad617a71240ef2fb0e9b50c4d6
SHA1fc41d3bff6c8926e6871168985aa122776401e1f
SHA256311ef26b71ce4c49983ba96aa069c7a8bb51491982e94469550ba1e55089bd24
SHA51241eeb6ceeebbe4081c497ce2fe4397127f321ae9191355a5fad052a6514b24ee720fc45443fb740888c3af1fcba88ff93397e8911b5a146b8006d4d8b86383a7
-
Filesize
60KB
MD5e0441cb9d3655ebba19f46928627a5c5
SHA16f6cc5c586692c5404b7d8d573d543d6b8a6e917
SHA256760d11c4caf7e4b681a5c9d7d0bd1a1d84461ede1aae2dcd3efa068aff375e66
SHA512cd759fda673563fca5e2727941a55651e12fb4edb7f4923092b4aaea91b18e474a2d5d6ec34f1888f46dee6e7dcc4c0b1cdf915b7db1053d25936f1364573772