Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe
-
Size
308KB
-
MD5
f56ffd696d70479bbcae621adf0849d1
-
SHA1
23bc3aa3c2708f2ffe475fa1825cdfcfef0ef741
-
SHA256
95ea4d87e45cacf7f599a17293622e50d1776627c854727003efe3bb2890bcf6
-
SHA512
c606a1129c12372a874874efbcd8994edc7922fa905726ca3feb2c48caf871715d9da8dcc3128eac308cecf31664d7a55da9499e58dd72124ac622dc5f53c214
-
SSDEEP
6144:vvbotDTpV27UC97EBSLSHP9JDFAS3Sj2TYdMJYK6tc2QrJqiZ1IFpLRw:vvst5V27UcCPHDFnQ2EdWOtUJDAF5Rw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1652 sctcs.exe -
Loads dropped DLL 5 IoCs
pid Process 1580 f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe 1580 f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\sctcs.exe f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\sctcs.exe f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2644 1652 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sctcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1652 1580 f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe 28 PID 1580 wrote to memory of 1652 1580 f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe 28 PID 1652 wrote to memory of 2644 1652 sctcs.exe 29 PID 1652 wrote to memory of 2644 1652 sctcs.exe 29 PID 1652 wrote to memory of 2644 1652 sctcs.exe 29 PID 1652 wrote to memory of 2644 1652 sctcs.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f56ffd696d70479bbcae621adf0849d1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\sctcs.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\sctcs.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 2843⤵
- Loads dropped DLL
- Program crash
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5f56ffd696d70479bbcae621adf0849d1
SHA123bc3aa3c2708f2ffe475fa1825cdfcfef0ef741
SHA25695ea4d87e45cacf7f599a17293622e50d1776627c854727003efe3bb2890bcf6
SHA512c606a1129c12372a874874efbcd8994edc7922fa905726ca3feb2c48caf871715d9da8dcc3128eac308cecf31664d7a55da9499e58dd72124ac622dc5f53c214