Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe
-
Size
45KB
-
MD5
eaccecdec5a7e237d06400de876869f6
-
SHA1
af0df03cc5dcebdd6fa16d6641522fc3de940ca6
-
SHA256
616b21f637eec2032f334c810beefa550e0a2dd34d29ec7210dd96604ddbbd33
-
SHA512
3267f1e5f6c77a39a6195ff92fa92b293cac7ea2d2a3008b6bdef45dfcd63be4183a02316ddfdafe3890b4df4639f31e2cde5e540f35e169cfbbc1e2531ad468
-
SSDEEP
768:pBgOMK6Vf0R3enuzLRGitzt4p6SPUb7LltTqUyu2FjdVN:hMK+Mf3Rrtzt4p8OUj2FnN
Malware Config
Signatures
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dsound.dll eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\DllCache\dsound.dllnbpUK eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\DllCache\dsound.dll eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\dsound.dllnbpUK eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\dsound.dll.mod eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe File created C:\Windows\SysWOW64\dsound.dll.mod eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe File created C:\Windows\SysWOW64\dsound.dllnbpUK eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\RGA322.tmp eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe File opened for modification C:\Windows\system\RGA322.tmp eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1820 1140 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1140 eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1820 1140 eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe 29 PID 1140 wrote to memory of 1820 1140 eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe 29 PID 1140 wrote to memory of 1820 1140 eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe 29 PID 1140 wrote to memory of 1820 1140 eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaccecdec5a7e237d06400de876869f6_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 962⤵
- Program crash
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD55b190fc51878a6f15014e04ef2e04628
SHA13b8331ee824723f3e77f849445ee2abc0dc78197
SHA25626cb5c9bd32401814ad38ddf7f24eeaf1cfac60b4aa1c7ca41407f916eae2540
SHA51202fe98cafadf2c14df2695e6fce154b5cbb2f6fef009be1040a7753b4f7fb042ec579d6bfc8d29a2b1f718115645b32772b37e51ae97aec5488368228d6d6e9b