Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe
-
Size
5.3MB
-
MD5
fb7526b9eda8e0d14e73958a1d45fbd3
-
SHA1
8a04bd74c86f77d9a6e81af796ac6e8fff856692
-
SHA256
2e70b4a25569d0578972289c3b0f8de1cf83a8f0c47c058ed6e685e77f3646b0
-
SHA512
28efadfae268e5c9acdfb311a9e9ee78213bf24a8be991e48cd1ea39705a808e217a3cb6618626317c5d8678aed110b3374cbd2947905c2621f282a3f2c2a5c7
-
SSDEEP
98304:7hLQqmoAMg29dBfGGLZbeC647NeK92f94B6RgSz+9a8Y1:7VtOTyBfVy47Nul4oRgSl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1744 AdjProg.exe -
Loads dropped DLL 4 IoCs
pid Process 1568 cmd.exe 1568 cmd.exe 1744 AdjProg.exe 1744 AdjProg.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdjProg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1744 AdjProg.exe 1744 AdjProg.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1568 3024 fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1568 3024 fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1568 3024 fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1568 3024 fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe 31 PID 1568 wrote to memory of 1220 1568 cmd.exe 33 PID 1568 wrote to memory of 1220 1568 cmd.exe 33 PID 1568 wrote to memory of 1220 1568 cmd.exe 33 PID 1568 wrote to memory of 1220 1568 cmd.exe 33 PID 1568 wrote to memory of 2408 1568 cmd.exe 34 PID 1568 wrote to memory of 2408 1568 cmd.exe 34 PID 1568 wrote to memory of 2408 1568 cmd.exe 34 PID 1568 wrote to memory of 2408 1568 cmd.exe 34 PID 1568 wrote to memory of 2888 1568 cmd.exe 35 PID 1568 wrote to memory of 2888 1568 cmd.exe 35 PID 1568 wrote to memory of 2888 1568 cmd.exe 35 PID 1568 wrote to memory of 2888 1568 cmd.exe 35 PID 1568 wrote to memory of 1628 1568 cmd.exe 36 PID 1568 wrote to memory of 1628 1568 cmd.exe 36 PID 1568 wrote to memory of 1628 1568 cmd.exe 36 PID 1568 wrote to memory of 1628 1568 cmd.exe 36 PID 1568 wrote to memory of 1744 1568 cmd.exe 37 PID 1568 wrote to memory of 1744 1568 cmd.exe 37 PID 1568 wrote to memory of 1744 1568 cmd.exe 37 PID 1568 wrote to memory of 1744 1568 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~D2BA.bat "C:\Users\Admin\AppData\Local\Temp\fb7526b9eda8e0d14e73958a1d45fbd3_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Ver "3⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\find.exeFind "XP"3⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\EPSON\PTSG\ /f3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_LOCAL_MACHINE\SOFTWARE\EPSON\PTSG\ /f3⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Users\Admin\AppData\Local\AdjProg.exeC:\Users\Admin\AppData\Local\AdjProg.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD55e9b43ffb570bde219c3c63bf0a50f6a
SHA193269b8dd85b650a04f96ad79876b36f508ca6f3
SHA2566d468ed2ef32d8f7486de26e817ff9e1e8bfac2e2ad7ff191722c2b29e0344c7
SHA5128faacf4b12e02b387da689f5eaf03843b5be75ee2f8992dbced6c00f28e3bf044a5ab47f0efd09a5938929d6fa448f6ab8dc996c4daab26787ee6008a8b41713
-
Filesize
441B
MD5b8f91fa3254e6ea6c77295ccf52fc53c
SHA1e048dabffabad71c387c00f45dfb38620aaad2f3
SHA2564092c70d0e928365b645029474ac79d85963f3aeb5a6c83ac871f5b1983a7301
SHA512fa5e3d4624b8373f9d072d162c33b4d8c76cb4c208bada37fada9a61e29c1b14912d713198340e96f440c0a16add0abd99030f69bd5e416d19f037dc55db7c7b
-
Filesize
76KB
MD5eaa3f442e2b4003cb9d0813f5ea9f561
SHA1228bfbd60c748fcf0a97667d10c80d93256774d1
SHA256057336ef31abf2573e42a72153cd320aedb07f4b816d0d9923f0b5d4219ed022
SHA512ed57561d00d8a2628ec3b6922906b3e1dee9c5fbfc4d8a2ade37b147c162a05227857d42b630a0ac2c6641c2b599e0a4118b14b8524f7f6e1e600f92b7698921
-
Filesize
2.3MB
MD53b3263653fc9f05632a988b421cea4b9
SHA145ddc2b254bdfdcece5b3c7d3733329d854407b9
SHA25625e51f8434e11206c589fe43fcfba1b236b18946e40a71390f656a23a032d7dc
SHA5126596a2f35c7f20d38f3df2e2aab25e67368c4670f722eb4e12174e2f0a8d3cf55285699ef0ef5895f02b9e17d97d28ae88e9fb549969ff576a83dad4dc7181fe