Analysis
-
max time kernel
150s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 12:35
Behavioral task
behavioral1
Sample
f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe
-
Size
158KB
-
MD5
f6072edfd0ffbef3deb52375585fce0d
-
SHA1
f9b5aefd3f123023c22288a892f1c530e244dfac
-
SHA256
1814b9bde75aa7f8d4c7ad9e60badb42f341f9cf2c75dc05292a784dab6a7ccc
-
SHA512
2f5975bd29a3c4679d639227253fc97e088b9f9493dd3f61dcd4f8d4c1200441eae90a85cd14f855fa5d0ffbf2b8fbf80ed16db847732860927be7b0d5aabd41
-
SSDEEP
3072:XA6Ucj4OV5/wqlltLqX9JZvfZLCY3Ioub4LQnG/aKqkcyhva:XA+j4WRlltLqNPvHvutG/aKqohC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2540 Rziqia.exe -
resource yara_rule behavioral1/memory/1040-0-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1040-7-0x0000000000490000-0x00000000004D3000-memory.dmp upx behavioral1/files/0x0007000000018b68-9.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe File created C:\Windows\Rziqia.exe f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe File opened for modification C:\Windows\Rziqia.exe f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Rziqia.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Rziqia.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rziqia.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main Rziqia.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International Rziqia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe 2540 Rziqia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2540 1040 f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe 29 PID 1040 wrote to memory of 2540 1040 f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe 29 PID 1040 wrote to memory of 2540 1040 f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe 29 PID 1040 wrote to memory of 2540 1040 f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6072edfd0ffbef3deb52375585fce0d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\Rziqia.exeC:\Windows\Rziqia.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD5f6072edfd0ffbef3deb52375585fce0d
SHA1f9b5aefd3f123023c22288a892f1c530e244dfac
SHA2561814b9bde75aa7f8d4c7ad9e60badb42f341f9cf2c75dc05292a784dab6a7ccc
SHA5122f5975bd29a3c4679d639227253fc97e088b9f9493dd3f61dcd4f8d4c1200441eae90a85cd14f855fa5d0ffbf2b8fbf80ed16db847732860927be7b0d5aabd41
-
Filesize
372B
MD5dba6232afca17d02d994874c8ad2792d
SHA192e296a022c9417093af86275c3741063078c6bd
SHA2567ef9b7918739cc2e2316498653d435c11773d93ba8b17e4a3d9a627717a06c78
SHA512a772c5984b1c8c024f2ce1dabe213699f381b4d06f968e471909a3d0d634c557faef02fa6eefbb1c972b4a170262a1adeb0768f41847afee43a1db6b835d0f85