Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:50
Behavioral task
behavioral1
Sample
eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe
-
Size
398KB
-
MD5
eab3bc48d6ba17b7974c806ff4acd84f
-
SHA1
a826916ab22e70c8de5b66bdb5ada15fd9426367
-
SHA256
f7dba4a6735721c6a63936ab693175e13ed482ad960896c84432fa25e48915ac
-
SHA512
9c04c2c592910ebbdbf63eba4597224a670c08acf1fcb318f97f5816d17835ca8ff8a1bde7570dfac75b12290f6bf61b4051a31f40664026a855b0b119651c07
-
SSDEEP
6144:ArCboqZY7Io9hpFcGwvdsSkQIbez8BMOssF2FgP:6CM1Uo9xAk8z8yJs8Fu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4636 Vpekea.exe -
resource yara_rule behavioral2/memory/4244-0-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/files/0x00070000000234a1-10.dat upx behavioral2/memory/4636-11-0x0000000000400000-0x0000000000465000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Vpekea.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe File created C:\Windows\Vpekea.exe eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe File opened for modification C:\Windows\Vpekea.exe eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Vpekea.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 55524 4636 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vpekea.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main Vpekea.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe 4636 Vpekea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4244 wrote to memory of 4636 4244 eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe 82 PID 4244 wrote to memory of 4636 4244 eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe 82 PID 4244 wrote to memory of 4636 4244 eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab3bc48d6ba17b7974c806ff4acd84f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\Vpekea.exeC:\Windows\Vpekea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 8803⤵
- Program crash
PID:55524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4636 -ip 46361⤵PID:55476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390B
MD5f6a62e05a2d5baac8eea52e019269c53
SHA1aece2131d3507b149df733d459a73e41079b24d9
SHA256978453d729c358f20412bcff34578ac3046d67b0370fa8a86732d4fd3d3cee36
SHA512e2e5ab0ffaf428457dce3da44fe5c9e1e1e5cb2571e9ce6274cb17f05a6e01ded5dcc72750e6ca12a6aec8792a4bb9d29d9acc5a1ffabefdb6b6d2e31fa94a58
-
Filesize
398KB
MD5eab3bc48d6ba17b7974c806ff4acd84f
SHA1a826916ab22e70c8de5b66bdb5ada15fd9426367
SHA256f7dba4a6735721c6a63936ab693175e13ed482ad960896c84432fa25e48915ac
SHA5129c04c2c592910ebbdbf63eba4597224a670c08acf1fcb318f97f5816d17835ca8ff8a1bde7570dfac75b12290f6bf61b4051a31f40664026a855b0b119651c07