Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:24
Behavioral task
behavioral1
Sample
ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe
-
Size
106KB
-
MD5
ea7ef53b4dc7cf2bab3cf0eb7d85f0ff
-
SHA1
1dd06ce2c5db0ee4e74882cc59135981109a12b7
-
SHA256
caf27b1a5d14996cea7b5d03d6fb232e18b4ac0cb72f1dfa3700622579160676
-
SHA512
34a88ef95debfce09956797db0187def769ec087c72abb572b317d4db9f3e11aeb2cd08d443eb28a9afa5dcbc4482ec138c1cab698037be6911ad228d323031c
-
SSDEEP
1536:eayvRUVU3uD8EUa0Z7nVqZfYVQfgjNg24HX1jclm0aQu5Gm1bNkJShQOp5nkdqoX:feCeuDNUVqZgqXNV07i5AkQEkdqo1t
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 536 apocalyps32.exe -
resource yara_rule behavioral1/memory/320-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/320-3-0x00000000005C0000-0x00000000005E7000-memory.dmp upx behavioral1/memory/320-8-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000c000000012033-6.dat upx behavioral1/memory/536-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/536-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/536-13-0x0000000040010000-0x000000004004C000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe File opened for modification C:\Windows\apocalyps32.exe ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 536 320 ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe 30 PID 320 wrote to memory of 536 320 ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe 30 PID 320 wrote to memory of 536 320 ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe 30 PID 320 wrote to memory of 536 320 ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe 30 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31 PID 536 wrote to memory of 2688 536 apocalyps32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea7ef53b4dc7cf2bab3cf0eb7d85f0ff_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\apocalyps32.exe-bs2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5ea7ef53b4dc7cf2bab3cf0eb7d85f0ff
SHA11dd06ce2c5db0ee4e74882cc59135981109a12b7
SHA256caf27b1a5d14996cea7b5d03d6fb232e18b4ac0cb72f1dfa3700622579160676
SHA51234a88ef95debfce09956797db0187def769ec087c72abb572b317d4db9f3e11aeb2cd08d443eb28a9afa5dcbc4482ec138c1cab698037be6911ad228d323031c