Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe
-
Size
7.2MB
-
MD5
ea299b53389ad382aa272039cb3466d8
-
SHA1
7fd15ce86b7c6f0dc3827451ceb24fcefa9a3133
-
SHA256
2c20f517b33d5c011d9f90e1dbc58f47335f6c10ca904fd9fc61ed56152c8ebc
-
SHA512
4c28f9619f76cd4c8d3aeed54e127c2391d43e57124ff7a0e89f0bcc94332c8678a1c4395d5d4fd4e735cecc4f5b753953077dc0ff0c558222e202c789df62a3
-
SSDEEP
196608:n58T9Nw+FZYIMbWRgLoxGr/atp5oPkes8pm5Ja:5sNwdXbHCGmtAcedpmva
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2872 ScreenshotCaptorInstall.exe 1904 is-SRMNK.tmp -
Loads dropped DLL 7 IoCs
pid Process 2064 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 2872 ScreenshotCaptorInstall.exe 2872 ScreenshotCaptorInstall.exe 2872 ScreenshotCaptorInstall.exe 2872 ScreenshotCaptorInstall.exe 1904 is-SRMNK.tmp 1904 is-SRMNK.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-SRMNK.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenshotCaptorInstall.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1904 is-SRMNK.tmp -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2872 2064 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2872 2064 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2872 2064 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2872 2064 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2872 2064 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2872 2064 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2872 2064 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 31 PID 2872 wrote to memory of 1904 2872 ScreenshotCaptorInstall.exe 32 PID 2872 wrote to memory of 1904 2872 ScreenshotCaptorInstall.exe 32 PID 2872 wrote to memory of 1904 2872 ScreenshotCaptorInstall.exe 32 PID 2872 wrote to memory of 1904 2872 ScreenshotCaptorInstall.exe 32 PID 2872 wrote to memory of 1904 2872 ScreenshotCaptorInstall.exe 32 PID 2872 wrote to memory of 1904 2872 ScreenshotCaptorInstall.exe 32 PID 2872 wrote to memory of 1904 2872 ScreenshotCaptorInstall.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\ScreenshotCaptorInstall.exeScreenshotCaptorInstall.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\is-INNI9.tmp\is-SRMNK.tmp"C:\Users\Admin\AppData\Local\Temp\is-INNI9.tmp\is-SRMNK.tmp" /SL4 $30160 "C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\ScreenshotCaptorInstall.exe" 51712 517123⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5270220b7df9bd2fc05509f75ee129cde
SHA1e39794afb25055a2dabd545424654f1858426dde
SHA256edb76332509e1f0a59840878eec04d313209f1ca14d8649452afdbd3dda72c19
SHA5127c0d734be748e435ab3d61e6db812f50b225ab588ebdf9b0b1c6aec914a1c99496cfe934fb22d3ed16f17adeda813e6449559f9704b0ee397ace70bd3cec7693
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
616KB
MD50e5fd0fc130e2380b08edca8f822f382
SHA1e36aacde42ac8f297d3bffb379c021639ef4c06a
SHA256d3f6c4e1b8e6d11661d4bdf79b438382bb5951e7a42cedbcac3ebbe88012373c
SHA512efaabebb37413eb2a689be4070827dbeb9ba8f88f6a90a3ed33225c68eb02e43e4760dcfdf3e59eba589db0519e9ac447035ef9b3822c0414ccebdc79a5bde37