Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe
-
Size
232KB
-
MD5
f267d07c82912e0222666aa2cdc4cbee
-
SHA1
630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
-
SHA256
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
-
SHA512
1ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42
-
SSDEEP
3072:8nkoa1KCPowRKbP7L10uxE232hxeF6HGqZ:ekoaVHa9x32hxq8Go
Malware Config
Extracted
buer
http://45.12.32.252:8080/
Signatures
-
resource yara_rule behavioral1/memory/2152-3-0x0000000040000000-0x000000004000B000-memory.dmp buer behavioral1/memory/2152-12-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral1/memory/2152-10-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral1/memory/2304-37-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral1/memory/2304-50-0x0000000040000000-0x000000004318E000-memory.dmp buer -
Deletes itself 1 IoCs
pid Process 2304 manager.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 manager.exe -
Loads dropped DLL 2 IoCs
pid Process 2152 f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe 2152 f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secinit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2304 manager.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2304 2152 f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2304 2152 f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2304 2152 f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2304 2152 f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe 30 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31 PID 2304 wrote to memory of 2276 2304 manager.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe" ensgJJ2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5f267d07c82912e0222666aa2cdc4cbee
SHA1630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
SHA2565c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
SHA5121ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42