Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe
-
Size
236KB
-
MD5
f539613bb8aa110f64481c22d073f510
-
SHA1
c961c5aec12d17d0e6427bb2886619d604947c9a
-
SHA256
e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f
-
SHA512
dba51c39a1d9f8cfe9d2a9b1cd9b06cb25f8bc60d3cae43105bb32cee0e7ff96960bd2438d4ee6e641a1416c05a5c67036696e195bb9f1cf17e49ebf158fc276
-
SSDEEP
3072:sR9HSUA9Au2+coOnrvBcopuYYtZRsROxO1fcjBN27oZV3DwdOwUqx+LR3:49HdA9A1oyTBcop1jQxO98bvUUqcF
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\responder.exe\"" responder.exe -
resource yara_rule behavioral1/memory/572-2-0x00000000002A0000-0x00000000002AA000-memory.dmp buer behavioral1/memory/572-3-0x0000000040000000-0x000000004000C000-memory.dmp buer behavioral1/memory/572-4-0x0000000040000000-0x0000000042824000-memory.dmp buer behavioral1/memory/572-6-0x00000000002A0000-0x00000000002AA000-memory.dmp buer behavioral1/memory/572-7-0x0000000040000000-0x000000004000C000-memory.dmp buer behavioral1/memory/2572-24-0x0000000040000000-0x0000000042824000-memory.dmp buer behavioral1/memory/2572-45-0x0000000040000000-0x0000000042824000-memory.dmp buer -
Deletes itself 1 IoCs
pid Process 2572 responder.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 responder.exe -
Loads dropped DLL 2 IoCs
pid Process 572 f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe 572 f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: responder.exe File opened (read-only) \??\K: responder.exe File opened (read-only) \??\M: responder.exe File opened (read-only) \??\S: responder.exe File opened (read-only) \??\T: responder.exe File opened (read-only) \??\Y: responder.exe File opened (read-only) \??\Z: responder.exe File opened (read-only) \??\B: responder.exe File opened (read-only) \??\E: responder.exe File opened (read-only) \??\J: responder.exe File opened (read-only) \??\L: responder.exe File opened (read-only) \??\P: responder.exe File opened (read-only) \??\U: responder.exe File opened (read-only) \??\H: responder.exe File opened (read-only) \??\I: responder.exe File opened (read-only) \??\N: responder.exe File opened (read-only) \??\Q: responder.exe File opened (read-only) \??\A: responder.exe File opened (read-only) \??\O: responder.exe File opened (read-only) \??\R: responder.exe File opened (read-only) \??\V: responder.exe File opened (read-only) \??\W: responder.exe File opened (read-only) \??\X: responder.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2412 2064 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language responder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secinit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2572 responder.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 572 wrote to memory of 2572 572 f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe 30 PID 572 wrote to memory of 2572 572 f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe 30 PID 572 wrote to memory of 2572 572 f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe 30 PID 572 wrote to memory of 2572 572 f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2572 wrote to memory of 2064 2572 responder.exe 31 PID 2064 wrote to memory of 2412 2064 secinit.exe 32 PID 2064 wrote to memory of 2412 2064 secinit.exe 32 PID 2064 wrote to memory of 2412 2064 secinit.exe 32 PID 2064 wrote to memory of 2412 2064 secinit.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\ProgramData\ErrorResponder\responder.exeC:\ProgramData\ErrorResponder\responder.exe "C:\Users\Admin\AppData\Local\Temp\f539613bb8aa110f64481c22d073f510_JaffaCakes118.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Deletes itself
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\responder.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 1364⤵
- Program crash
PID:2412
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5f539613bb8aa110f64481c22d073f510
SHA1c961c5aec12d17d0e6427bb2886619d604947c9a
SHA256e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f
SHA512dba51c39a1d9f8cfe9d2a9b1cd9b06cb25f8bc60d3cae43105bb32cee0e7ff96960bd2438d4ee6e641a1416c05a5c67036696e195bb9f1cf17e49ebf158fc276