Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe
-
Size
180KB
-
MD5
fd600ef23834b3ceb20c1200b9ba94ba
-
SHA1
60b68644c61210b7b53ce841478868ed8abda6d8
-
SHA256
18216d83a83de5405a136f32d79d9906b85925271753984a5a824db6cb8283d6
-
SHA512
796b920710e7c95d310bc453419665ad95ffa54c3e1675c2c191ace8368f3c8af934268661eb341f0d028849a56d717a83b5d428f095383bbb620e7349de7d2c
-
SSDEEP
3072://vGHqJLx6B/CRLdhHt5GWp1icKAArDZz4N9GhbkrNEk47K0qZy:nWqA/eRBp0yN90QE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2732 fia.exe 2856 stub.EXE -
Loads dropped DLL 2 IoCs
pid Process 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2732 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 29 PID 2160 wrote to memory of 2732 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 29 PID 2160 wrote to memory of 2732 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 29 PID 2160 wrote to memory of 2732 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 29 PID 2160 wrote to memory of 2732 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 29 PID 2160 wrote to memory of 2732 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 29 PID 2160 wrote to memory of 2732 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 29 PID 2160 wrote to memory of 2856 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2856 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2856 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2856 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2856 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2856 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2856 2160 fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd600ef23834b3ceb20c1200b9ba94ba_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fia.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fia.exe2⤵
- Executes dropped EXE
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\stub.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\stub.EXE2⤵
- Executes dropped EXE
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD58ac20ab22be723af1b2b69dc5f5c9f16
SHA1e6724138692f50042e40a14c735d070e98fac0ea
SHA256f948ed02a1dcac31f95ed2ce68fd424569965c330f04e865b8cc4c0d24b14350
SHA512ca09297db98b81b85ae9f1813ffbb67e75848748c8d32873a316ab8c086131acdcafe1dda265edcf780e07fc9173c68c5b0c6a61855f0e5e410e3a68d351b8c4
-
Filesize
17KB
MD5ab40d0cbeccd167f369c3e5278ee5519
SHA1f9bb18cf69f3c504192eed63cf234587d15436cd
SHA256faee731c74715b6a3e948d8e5b553e7da5d8a9de161179030f30583ae1862f01
SHA5129632454962fde1bf5b74d54a3c868ecba3975ef97a7ba14f3f1f447c5a1d8b8dc1a2c46e4406a075e3ad8a66cd550433c12c81a3d61bac6b6b7f0c2300943ea7