Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe
-
Size
131KB
-
MD5
eac208eaaeade3d7b93abf20e490c070
-
SHA1
661c2227fd98d07cb313491918e96696bc3ef1ed
-
SHA256
47ff5712479094b9b0f56f8355c79f68e6c1cf0a73df81941ba4e15d7869615a
-
SHA512
db699e4154e38de1cd29a7a5986ca17cb1e246075c5b76bcc50e762cc6ef089d7e45141d808ed79887ef3f1b76c73ba5231a1c41862f24180dc9019590c9f6ac
-
SSDEEP
1536:XR6JlmvbgqIKrHkgtuf3O7nGgarSgRwvvwLm8NJLFAKJMV5Vy6KKUKw0Fdnu4w6v:XR6Jk/Ef3OCgaqvYLm8PHRPKUzTksyZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2752 Qfiwea.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Qfiwea.exe eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Qfiwea.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Qfiwea.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe File created C:\Windows\Qfiwea.exe eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qfiwea.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main Qfiwea.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International Qfiwea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe 2752 Qfiwea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2752 2652 eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2752 2652 eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2752 2652 eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2752 2652 eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Qfiwea.exeC:\Windows\Qfiwea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5eac208eaaeade3d7b93abf20e490c070
SHA1661c2227fd98d07cb313491918e96696bc3ef1ed
SHA25647ff5712479094b9b0f56f8355c79f68e6c1cf0a73df81941ba4e15d7869615a
SHA512db699e4154e38de1cd29a7a5986ca17cb1e246075c5b76bcc50e762cc6ef089d7e45141d808ed79887ef3f1b76c73ba5231a1c41862f24180dc9019590c9f6ac
-
Filesize
372B
MD51913cef99a91236bcab058c26dfc8530
SHA1ec2e78a147f1a0d96d685d7cd142195ba1993918
SHA2567ce5b153e59500f31d01f8270a1eac03474220bfb624344cbe861283e8ded1bc
SHA51271f9a5d1f02b93d8b7b4f5dc4ccfb36551247aa98679c9f1508e01e8f26ab4230aa13dd7fe0530ef3313102c11b9aaa502a0104413bcab223d008e9e1b5e25e6