Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe
-
Size
44KB
-
MD5
e1f6ffa61eed0e67aa772cb5c2941a85
-
SHA1
572ee1a01e057a2a412f5dc16712e12f2a349374
-
SHA256
79c5fa5753fdfb703954131570720b8b7e1d49e8bc3b0c8eb16cc7ba6cbab478
-
SHA512
e7d41585e3b7b7785135e381ee737e0e6ffbf4e356e2f7063df9d92f70e3c08c7dc8db62478098c93628f47314f4ad680ab1c485140478258f10e3a1b0651ebc
-
SSDEEP
384:64gflvGtX415aW8n7zI2HiTwM/XX4qSpct5QYr:6VGtXe51koTwM/Xkat5QY
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2752 pcikk.exe -
Loads dropped DLL 2 IoCs
pid Process 2680 e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe 2680 e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\pcik.dll e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe File created C:\Windows\SysWOW64\pcikk.exe e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pcikk.exe e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2752 2680 e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2752 2680 e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2752 2680 e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2752 2680 e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2540 2680 e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe 32 PID 2680 wrote to memory of 2540 2680 e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe 32 PID 2680 wrote to memory of 2540 2680 e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe 32 PID 2680 wrote to memory of 2540 2680 e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\pcikk.exeC:\Windows\system32\pcikk.exe ˜‰2⤵
- Executes dropped EXE
PID:2752
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\e1f6ffa61eed0e67aa772cb5c2941a85_JaffaCakes118.exe.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD55de76a63092fc627064bedafe4c139be
SHA1c0dc4d93a4d0cce9feb8b3ecf2e654bd72bdf174
SHA2566106605595fc2602fb7c91a73556124be05d95d116e41a18637b05d2f7dfa8ae
SHA5123d97f90c05675edbd8e1d2a9cc17990eba972f08e3f74ea3ff8d600655d6c2ccd8b561637efa3861ef2649d6408016130b32e781033354530bc2459020def45f
-
Filesize
44KB
MD5e1f6ffa61eed0e67aa772cb5c2941a85
SHA1572ee1a01e057a2a412f5dc16712e12f2a349374
SHA25679c5fa5753fdfb703954131570720b8b7e1d49e8bc3b0c8eb16cc7ba6cbab478
SHA512e7d41585e3b7b7785135e381ee737e0e6ffbf4e356e2f7063df9d92f70e3c08c7dc8db62478098c93628f47314f4ad680ab1c485140478258f10e3a1b0651ebc