Analysis
-
max time kernel
7s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 00:13
Behavioral task
behavioral1
Sample
fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe
-
Size
769KB
-
MD5
fb273fcdc29af424cda3607500c60b98
-
SHA1
51b2bb61e87d07e61901d2087942ef71b6dc20ad
-
SHA256
c41ac9475f9cf98355758e757040f4d7ece9f58e5308715bc511f72a231b1613
-
SHA512
79ee6265b72ebae004e47dadb79df9326b74448485e822507681fb7e5438e7f2e798b729e3c46a8d1d9b9fbfe58db9bf9426d252b7ec1e2ad43733e89119a540
-
SSDEEP
12288:6CqIuMQh1EUedx2mZ6ivA1jwHSr/ROSQ8upuDi6VWSe3aG0I+O81AYoURW8BKNP:6RIuMWedx20MwyrcSUQdWvjU1ASY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2852 svchosty.exe -
Loads dropped DLL 4 IoCs
pid Process 1364 fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe 1364 fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe 1364 fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe 1364 fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1364-0-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/files/0x002c0000000171a9-6.dat upx behavioral1/memory/2852-25-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral1/memory/2852-26-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral1/memory/2560-47-0x0000000001E80000-0x0000000001EFB000-memory.dmp upx behavioral1/memory/1320-55-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral1/memory/2352-70-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2852 1364 fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2852 1364 fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2852 1364 fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe 30 PID 1364 wrote to memory of 2852 1364 fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb273fcdc29af424cda3607500c60b98_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exe"C:\Users\Admin\AppData\Local\Temp\svchosty.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe3⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe4⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe5⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe6⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe7⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe8⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe9⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe10⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe11⤵PID:616
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a01⤵PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\js3[1].js
Filesize1KB
MD5a66b149a7ebc798955373415d683f32a
SHA115ceaba8cfae8368600620ae97aa26ae7331d626
SHA256036c94653e84e6078c087abeb3ac8804491d27b27938839ae3df42b31e2238d9
SHA512286add411911651ed9217ab94b286d4e3fb546f4bf39c451eff86df0b6daab412d2fd97e0e34c4b71322e862eddf8bc1efdb9d7e1e3c53c15bb420f609966443
-
Filesize
312KB
MD55a2bebecff3806d59462205061c54688
SHA1ac80e073d32f9f3b17d150969e7729627072b80e
SHA25602c623f0f0a60f06b16f4b40306b26e71b047d35eaa0195982696225c5d57e1f
SHA51289b6012ec78d69067cbceb89a7cce6c75415c1d0dee87c16c3e142c68b283c510cc3a02687b084bf6689355d604ea41f970ef66ddef9742c9d8601d89a4836ed