Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe
-
Size
126KB
-
MD5
e1fe86238968acb0c86eb30df2a053a6
-
SHA1
a5c8e14462e914c6c00f12155766021ef9db05d8
-
SHA256
0b2badde7d2548a1157a5d15c258f3de0186e5e9681b4373e1bdc9c76813999d
-
SHA512
284acbec64ee8f00380da67efb2f0cd3524feacf4732d1e96cba55eeb6f9e1702002fbe5e27083594b23159db5ec1c61a64f70010af12d8fe2fabee4c143d7b5
-
SSDEEP
3072:lJLmCx/lVDZG+Q6RljqASJwtSFq7PDhPEGSJSnwAHZye6JM:bdM+uFJwtqUdPnSUnXZye6J
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2220 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2652 F_Server.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.bat e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe File created C:\Windows\SysWOW64\F_Server.exe e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\F_Server.exe e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe File created C:\Windows\SysWOW64\F_Server.dll e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\F_Server.exe F_Server.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2220 2308 e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe 32 PID 2308 wrote to memory of 2220 2308 e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe 32 PID 2308 wrote to memory of 2220 2308 e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe 32 PID 2308 wrote to memory of 2220 2308 e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1fe86238968acb0c86eb30df2a053a6_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Windows\SysWOW64\F_Server.exeC:\Windows\SysWOW64\F_Server.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5987a486d9d3e0117254099ba2add1b45
SHA1943e066b4867f956cb0c9fa4c1adbfde4690ace7
SHA256c21a4af5dde21669a7b064e45a5ba9f1aad8ed8aa9966bc87ca3275cd80aa14a
SHA51231dbf1ca5f690086bf1dc0305009d8b6d6a3d22905e2d83bafd3abb1c3729372120b00339152e1bf6c8c7393175429aa228cb09fc3b4e8fbaddbcb3d2bc67f7a
-
Filesize
126KB
MD5e1fe86238968acb0c86eb30df2a053a6
SHA1a5c8e14462e914c6c00f12155766021ef9db05d8
SHA2560b2badde7d2548a1157a5d15c258f3de0186e5e9681b4373e1bdc9c76813999d
SHA512284acbec64ee8f00380da67efb2f0cd3524feacf4732d1e96cba55eeb6f9e1702002fbe5e27083594b23159db5ec1c61a64f70010af12d8fe2fabee4c143d7b5