Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe
-
Size
100KB
-
MD5
e1b7edc7b64d3658dc80ff55416b0c13
-
SHA1
dce6acf0d134a7b9a59302624264083a43e0e292
-
SHA256
687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b
-
SHA512
6b86abf8505edfe5e428cb3c3128fa9dd65e4d8bdc0c4b1e1f951733fce66d25e8929150137d2454f77332dc96f6be326a9f9ffe309899fa7ebb731e73f24f81
-
SSDEEP
1536:lYz5kHo5yO+yZoLyX5FfFv4Q3PmsPtUAlItRng0k5JQDVYvpU76:6GPO3Zgy/fB4QOsPtMtRg0k5JQJEpU7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4496 winffnh.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update 495955904 = "C:\\Windows\\16211087811479243\\winffnh.exe" e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update 495955904 = "C:\\Windows\\16211087811479243\\winffnh.exe" e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\16211087811479243\winffnh.exe e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe File opened for modification C:\Windows\16211087811479243\winffnh.exe e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe File opened for modification C:\Windows\16211087811479243 e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe -
Program crash 8 IoCs
pid pid_target Process procid_target 4024 3372 WerFault.exe 83 2256 3372 WerFault.exe 83 4544 3372 WerFault.exe 83 692 3372 WerFault.exe 83 1356 4496 WerFault.exe 90 3924 4496 WerFault.exe 90 1352 4496 WerFault.exe 90 3432 4496 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winffnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3372 wrote to memory of 4496 3372 e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe 90 PID 3372 wrote to memory of 4496 3372 e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe 90 PID 3372 wrote to memory of 4496 3372 e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1b7edc7b64d3658dc80ff55416b0c13_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\16211087811479243\winffnh.exeC:\Windows\16211087811479243\winffnh.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 7523⤵
- Program crash
PID:1356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 8403⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 9483⤵
- Program crash
PID:1352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 9883⤵
- Program crash
PID:3432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 5522⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 6602⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 7762⤵
- Program crash
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 8162⤵
- Program crash
PID:692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3372 -ip 33721⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3372 -ip 33721⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3372 -ip 33721⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3372 -ip 33721⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4496 -ip 44961⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4496 -ip 44961⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4496 -ip 44961⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4496 -ip 44961⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5e1b7edc7b64d3658dc80ff55416b0c13
SHA1dce6acf0d134a7b9a59302624264083a43e0e292
SHA256687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b
SHA5126b86abf8505edfe5e428cb3c3128fa9dd65e4d8bdc0c4b1e1f951733fce66d25e8929150137d2454f77332dc96f6be326a9f9ffe309899fa7ebb731e73f24f81