Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe
-
Size
232KB
-
MD5
f267d07c82912e0222666aa2cdc4cbee
-
SHA1
630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
-
SHA256
5c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
-
SHA512
1ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42
-
SSDEEP
3072:8nkoa1KCPowRKbP7L10uxE232hxeF6HGqZ:ekoaVHa9x32hxq8Go
Malware Config
Extracted
buer
http://45.12.32.252:8080/
Signatures
-
resource yara_rule behavioral2/memory/4332-2-0x0000000000480000-0x0000000000489000-memory.dmp buer behavioral2/memory/4332-3-0x0000000040000000-0x000000004000B000-memory.dmp buer behavioral2/memory/4216-10-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral2/memory/4332-13-0x0000000040000000-0x000000004000B000-memory.dmp buer behavioral2/memory/4332-12-0x0000000000480000-0x0000000000489000-memory.dmp buer behavioral2/memory/4332-11-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral2/memory/4216-14-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral2/memory/4216-15-0x0000000040000000-0x000000004318E000-memory.dmp buer behavioral2/memory/4216-29-0x0000000040000000-0x000000004318E000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 4216 manager.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4672 4332 WerFault.exe 81 3904 756 WerFault.exe 86 1064 756 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secinit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4216 manager.exe 4216 manager.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4332 wrote to memory of 4216 4332 f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe 82 PID 4332 wrote to memory of 4216 4332 f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe 82 PID 4332 wrote to memory of 4216 4332 f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe 82 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86 PID 4216 wrote to memory of 756 4216 manager.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\f267d07c82912e0222666aa2cdc4cbee_JaffaCakes118.exe" ensgJJ2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 2724⤵
- Program crash
PID:3904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 2804⤵
- Program crash
PID:1064
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 4722⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4332 -ip 43321⤵PID:1240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 756 -ip 7561⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 756 -ip 7561⤵PID:1824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5f267d07c82912e0222666aa2cdc4cbee
SHA1630f7d9cbbb0af1a0d90502bc4be4dbc32b458de
SHA2565c7f5813142029aa1a1326ebef5b7664ab93e0c6bb40cbb40bf9146556a783f3
SHA5121ccfb880532191238f8a1da2448b83ba7128868431b65909bbc7ebfc29a87ab6bc1060ac56b736d769edb8d703b655f9d5fb13fd18bbc1257dfaba0a8d8bdc42