Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe
-
Size
172KB
-
MD5
e0bf188e12e4a5e6fa88fa53dd25d2d2
-
SHA1
1edd4b1f4a6b81bc579c61ac4189321e56be1734
-
SHA256
72a82a566eb7c23d1e42f21e522a5200e0689ee2c9d56737b57b311224c57c82
-
SHA512
df167654d6fdbdcd900cd0f6d76cac89202045dfcfb82bc6e2c65b1799acef4c1bbd65b27483b60f5afbed6404fc11d5384cf15cfa8d665a5a0a8f5547f64cd2
-
SSDEEP
3072:xKBCqWyB9ORAfKdw5rXu0tVWe/ocgo1PIWckX+V1g3sWDE:xEB9O+T1PVWe/RNPIe+ris
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\259E234.tmp E11C.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 E11C.exe -
Loads dropped DLL 12 IoCs
pid Process 2756 e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe 2756 e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe 2756 e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe 2756 e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe 2756 e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe 1508 WerFault.exe 1508 WerFault.exe 1508 WerFault.exe 1508 WerFault.exe 1508 WerFault.exe 1508 WerFault.exe 1508 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\259E234.tmp E11C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1508 2680 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E11C.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2756 e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2680 2756 e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2680 2756 e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2680 2756 e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2680 2756 e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe 31 PID 2680 wrote to memory of 1508 2680 E11C.exe 32 PID 2680 wrote to memory of 1508 2680 E11C.exe 32 PID 2680 wrote to memory of 1508 2680 E11C.exe 32 PID 2680 wrote to memory of 1508 2680 E11C.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0bf188e12e4a5e6fa88fa53dd25d2d2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\E11C.exe"C:\Users\Admin\AppData\Local\Temp\E11C.exe"2⤵
- Boot or Logon Autostart Execution: Print Processors
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 2363⤵
- Loads dropped DLL
- Program crash
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5aee8b623934941f0731a64a58b37746c
SHA19ed8e3587065c5b97295ab67c04f63529d6ba4e7
SHA256fcc8ca146f5f468b3315ea78bbcda59dfc094434608fb8d4ac92821792807ac0
SHA512afab472e37aef9c19c1f03295f6f990661c23197a4e3ece2003255c322affbc228a6c83d64cdc71a0cee8c715dd99051352dcc462387dda8bf111baee6e27010