Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 14:21
Static task
static1
Behavioral task
behavioral1
Sample
eb840ccdab283227762c1b097063f278_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb840ccdab283227762c1b097063f278_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb840ccdab283227762c1b097063f278_JaffaCakes118.exe
-
Size
34KB
-
MD5
eb840ccdab283227762c1b097063f278
-
SHA1
311561e8904ee0aaabc9544d0e6f65ce68a14f97
-
SHA256
83005a3a661280203721cd5be27261aae7973497fea01a3c93717e14a44e7688
-
SHA512
ba5e74a165f2330e79514a8930894d60c94ae46fdb164791bfdf31c6f5b92721c539b66359468f6d45b8951b6002e14efc5be0908b4080d5172dfc9743eb2d16
-
SSDEEP
768:mzQYScGrIubHuYtvdxwYHw5FAe2Qgncwx7:gQTIubHy5wQgf
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 468 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe 468 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\46c147f1\jusched.exe eb840ccdab283227762c1b097063f278_JaffaCakes118.exe File created C:\Program Files (x86)\46c147f1\46c147f1 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb840ccdab283227762c1b097063f278_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe 2216 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 468 wrote to memory of 2216 468 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe 30 PID 468 wrote to memory of 2216 468 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe 30 PID 468 wrote to memory of 2216 468 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe 30 PID 468 wrote to memory of 2216 468 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb840ccdab283227762c1b097063f278_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb840ccdab283227762c1b097063f278_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\46c147f1\jusched.exe"C:\Program Files (x86)\46c147f1\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
34KB
MD51d000aeb2906e24876844a36ac21885c
SHA11bdce2feb124fc035ab0dd282a0a85ccba26fdf2
SHA25622b41b830ea320a4af4ca8762b9e346d1e3cc656a11192e912025ad2a6238566
SHA512ce2b27fc6fbba051bbaf1b7ebc8cfcd392ab4333bb4af4de726a8896d5e47a8448c0577ac3d2ccfc27296bde2fd724eef595bd92c9ffed7147adbc0fd7d08cd0