Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe
-
Size
877KB
-
MD5
e0a823c73d2e38622f25ae109b77b2dc
-
SHA1
18bfcab342e693e90de08f2eca8663462953e088
-
SHA256
16dcbccb580b6b9d34a9c767e667b701b8fa87822745fa2810511c179414130b
-
SHA512
dd555f3dd4991dd45ae21249a7a731aa806ff36ae50cac275355a6673c1a0f1ab1a261e657920a8bade6e8627c76d64cb1493489c7b4cae0c6fcf90d96dca31e
-
SSDEEP
24576:59MLKmtvPyHu7Xq+0n+y9pNg4W7HM8ocN+2QHC6y:jiKmHyOrp7s8VQ6
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2692 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 2692 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 2692 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 2692 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2292 1992 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2292 1992 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2292 1992 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2292 1992 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2292 1992 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2292 1992 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2292 1992 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2692 2292 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2692 2292 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2692 2292 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2692 2292 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2692 2292 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2692 2292 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2692 2292 e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0a823c73d2e38622f25ae109b77b2dc_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5986fe87a52952f061f8fc85a13b3fe93
SHA118f8a508fee766566e7e24b3b85ede8dcd880272
SHA256293e979a8f278103e820f1b9685f6d5a3be2a4349e9517966c94230684ffc62f
SHA512cfe838c91bc0b33a85c2405471504c560b5205523d66b3301e4317bdce289632805d9fd2c1eb10401dd754d893bbb4729d880b77e87a76360c595170d7a520aa
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5e7001f575411437f73afc246f0af31b0
SHA198170d6df75077f62ebf54d3fd9bc119dcd7b5e6
SHA2560f477dee715645188f28846fc609e8e01de62bb544a0a8806ea39bde82822809
SHA51218cacfc38fe5c6073fee13dd81d2ac3be44bc0c72dec2958490164ce714514a4b9cc19929bc8a6673611a19f6d5b258e46431f9631071e05d29a3a821ed345d5