Analysis
-
max time kernel
31s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
fb67fe010cb82d4b3dd79a29780fc755_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb67fe010cb82d4b3dd79a29780fc755_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb67fe010cb82d4b3dd79a29780fc755_JaffaCakes118.exe
-
Size
194KB
-
MD5
fb67fe010cb82d4b3dd79a29780fc755
-
SHA1
8a178e81b90491af4a3155fb55b38fa98f3249e4
-
SHA256
15f0c3a3a75d76d29d8bd5e341110f5509d9cc45f110cf2871b978ad73f21509
-
SHA512
6eb6fb13ed9cb3569838357de5176b76608d6884c5f4aa294f37c13e6bb7d55c3662c0eec06168473519dc38abdda5200ba21828a11e51bc81b8f884b311554f
-
SSDEEP
6144:yIxKaSLF4uIISZfiYbq7a7S7S6hwSnqc:dSB4Ct7SRJ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\svflooje.exe fb67fe010cb82d4b3dd79a29780fc755_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2868 svflooje.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\keys.ini fb67fe010cb82d4b3dd79a29780fc755_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2420 2868 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svflooje.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2420 2868 svflooje.exe 31 PID 2868 wrote to memory of 2420 2868 svflooje.exe 31 PID 2868 wrote to memory of 2420 2868 svflooje.exe 31 PID 2868 wrote to memory of 2420 2868 svflooje.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb67fe010cb82d4b3dd79a29780fc755_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb67fe010cb82d4b3dd79a29780fc755_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
PID:1348
-
C:\Windows\SysWOW64\drivers\svflooje.exeC:\Windows\SysWOW64\drivers\svflooje.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 2722⤵
- Program crash
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5fb67fe010cb82d4b3dd79a29780fc755
SHA18a178e81b90491af4a3155fb55b38fa98f3249e4
SHA25615f0c3a3a75d76d29d8bd5e341110f5509d9cc45f110cf2871b978ad73f21509
SHA5126eb6fb13ed9cb3569838357de5176b76608d6884c5f4aa294f37c13e6bb7d55c3662c0eec06168473519dc38abdda5200ba21828a11e51bc81b8f884b311554f