Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe
-
Size
83KB
-
MD5
f56b2528b9ebcb802d871f2dc8b10ddb
-
SHA1
3498a1d3c1e610f9d9c8c3a2bb034a49e83175e6
-
SHA256
26a02e4854abb23bdad0e441bccfef63529f124124614bbde49ca3d013752b11
-
SHA512
96fcb56bd0cd127ea581108251340f926a9f28e70f8006e5ad5d949f752b406ad43754ca3ce207c019bdd47ceee7815cedf7bcd249e8702e2b3762485938410a
-
SSDEEP
1536:cHQ8dhY6w6o2zy1zSP/BfPrHRIDyZi1GYnv5RImyU49BCeyyQqI:evTzw6Jzy5SP/hrxhPyv5R8U49ILhb
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4940 iexplorer.exe 4436 iexplorer.exe 4792 iexplorer.exe 3244 iexplorer.exe 3336 iexplorer.exe 3812 iexplorer.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\iexplorer.exe iexplorer.exe File created C:\Windows\SysWOW64\iexplorer.exe iexplorer.exe File created C:\Windows\SysWOW64\iexplorer.exe iexplorer.exe File created C:\Windows\SysWOW64\iexplorer.exe iexplorer.exe File created C:\Windows\SysWOW64\iexplorer.exe f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\iexplorer.exe f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe File created C:\Windows\SysWOW64\iexplorer.exe iexplorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 4940 iexplorer.exe 4940 iexplorer.exe 4940 iexplorer.exe 4940 iexplorer.exe 4940 iexplorer.exe 4940 iexplorer.exe 4940 iexplorer.exe 4940 iexplorer.exe 4940 iexplorer.exe 4940 iexplorer.exe 4940 iexplorer.exe 4940 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4436 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 4792 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3244 iexplorer.exe 3336 iexplorer.exe 3336 iexplorer.exe 3336 iexplorer.exe 3336 iexplorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4940 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 90 PID 3228 wrote to memory of 4940 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 90 PID 3228 wrote to memory of 4940 3228 f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe 90 PID 4940 wrote to memory of 4436 4940 iexplorer.exe 98 PID 4940 wrote to memory of 4436 4940 iexplorer.exe 98 PID 4940 wrote to memory of 4436 4940 iexplorer.exe 98 PID 4436 wrote to memory of 4792 4436 iexplorer.exe 100 PID 4436 wrote to memory of 4792 4436 iexplorer.exe 100 PID 4436 wrote to memory of 4792 4436 iexplorer.exe 100 PID 4792 wrote to memory of 3244 4792 iexplorer.exe 102 PID 4792 wrote to memory of 3244 4792 iexplorer.exe 102 PID 4792 wrote to memory of 3244 4792 iexplorer.exe 102 PID 3244 wrote to memory of 3336 3244 iexplorer.exe 111 PID 3244 wrote to memory of 3336 3244 iexplorer.exe 111 PID 3244 wrote to memory of 3336 3244 iexplorer.exe 111 PID 3336 wrote to memory of 3812 3336 iexplorer.exe 115 PID 3336 wrote to memory of 3812 3336 iexplorer.exe 115 PID 3336 wrote to memory of 3812 3336 iexplorer.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\iexplorer.exeC:\Windows\system32\iexplorer.exe -bai C:\Users\Admin\AppData\Local\Temp\f56b2528b9ebcb802d871f2dc8b10ddb_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\iexplorer.exeC:\Windows\system32\iexplorer.exe -bai C:\Windows\SysWOW64\iexplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\iexplorer.exeC:\Windows\system32\iexplorer.exe -bai C:\Windows\SysWOW64\iexplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\iexplorer.exeC:\Windows\system32\iexplorer.exe -bai C:\Windows\SysWOW64\iexplorer.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\iexplorer.exeC:\Windows\system32\iexplorer.exe -bai C:\Windows\SysWOW64\iexplorer.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\iexplorer.exeC:\Windows\system32\iexplorer.exe -bai C:\Windows\SysWOW64\iexplorer.exe7⤵
- Executes dropped EXE
PID:3812
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5f56b2528b9ebcb802d871f2dc8b10ddb
SHA13498a1d3c1e610f9d9c8c3a2bb034a49e83175e6
SHA25626a02e4854abb23bdad0e441bccfef63529f124124614bbde49ca3d013752b11
SHA51296fcb56bd0cd127ea581108251340f926a9f28e70f8006e5ad5d949f752b406ad43754ca3ce207c019bdd47ceee7815cedf7bcd249e8702e2b3762485938410a