Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe
-
Size
17KB
-
MD5
f5e1567cf5a6df4fcd7dbc3e94bbc2d3
-
SHA1
e0f7d2b16bee17ea7738dbb44c8db71e2c311c36
-
SHA256
d521465c366b19889c43f31b498105cd6bf0f3e3206ff787ebfb11f679fcc4e7
-
SHA512
20709f97d50639a28653627ca2031eefed57d11a531dc112ed393b2eadf94448ab66cc814124f87313da53f9cbe16ac4dab8bd3c197ecb50055f367b78370ea2
-
SSDEEP
384:yLDLsy4PXGxuTIo9WIRQhN2nBoK9XqYHfc85M2Pu0V:yLDLsRlTIdN2nBoCqqfcY7Pu0V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2068 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2112 regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Sotfone\1727262696.dll f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 828 wrote to memory of 2112 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 31 PID 828 wrote to memory of 2112 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 31 PID 828 wrote to memory of 2112 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 31 PID 828 wrote to memory of 2112 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 31 PID 828 wrote to memory of 2112 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 31 PID 828 wrote to memory of 2112 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 31 PID 828 wrote to memory of 2112 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 31 PID 828 wrote to memory of 2068 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 32 PID 828 wrote to memory of 2068 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 32 PID 828 wrote to memory of 2068 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 32 PID 828 wrote to memory of 2068 828 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files (x86)\Sotfone\1727262696.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2112
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\tempdel.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232B
MD559b34c53026b8a6e3a50dbbf5f63651c
SHA109cb3706dc04200226c966a3f76af98ee80fa15e
SHA25678528623a7b07a3d657ec3e60089137559debd4dfa607eacdf81978d0e246cb7
SHA5124ae2275c841d1e7c213748c145a1baa173fad7d074be9bc25d5b9c2aad361f714ef8494e027a7df029bb832a1b81b44928fc85e58523650ccacc959d808e8712
-
Filesize
14KB
MD559150b4d1e8919de425493e63accf9bc
SHA11ad3c783c1fa37bdf78f5a838c3f0425ac9347c5
SHA256df0800133950e16e92b311822014011c3fd4b7b7890833db3d15464ba991c4c7
SHA512b792fde716348bc299c03c6476728ea5497ba067add9566791656abd5ea2ef59a92618262b84e4e0ad62e95a4fe21f16c87f180bf63d9486d44afb7be23df6b2