Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe
-
Size
4.7MB
-
MD5
fbf840556e216313d7bff3102c48a5aa
-
SHA1
a489b16ce474eb8fd5bd0cb2aa19416e171d9fcb
-
SHA256
65ec5804537d04c5c4b987e254cdd3c877159ed421ed332f7266a344ca1f54c6
-
SHA512
338d752f4606dd4d50cf86fa6fc82448cdacfed49957b473fa4c90be5646731248c8619ccd1a8e979d1475c5acdd946423ecc951ca50c16f30fe44b2431ddb63
-
SSDEEP
98304:XGTfeL7jYAWyoFX/6z7vJZ8jpSiBwUzC/j+rxsyKGIvdPL:WKPYAWkhZeMb8IvdPL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2832 explorer.exe 2760 iexplore.exe -
Loads dropped DLL 4 IoCs
pid Process 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe 2832 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2832 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2832 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2832 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2832 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2760 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2760 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2760 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2760 2708 fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe 32 PID 2832 wrote to memory of 2768 2832 explorer.exe 33 PID 2832 wrote to memory of 2768 2832 explorer.exe 33 PID 2832 wrote to memory of 2768 2832 explorer.exe 33 PID 2832 wrote to memory of 2768 2832 explorer.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbf840556e216313d7bff3102c48a5aa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe" --mn=02⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\30450.bat"3⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Users\Admin\AppData\Local\Temp\iexplore.exe"C:\Users\Admin\AppData\Local\Temp\iexplore.exe" --mn=0 --ch=12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD51c46b0f95c500d41f5ccfdaed2ffd26e
SHA1c7115caadbf1d98f86b6ad45a6e346167dc97998
SHA256a106fc945e442a1878b0cc0211182d39c210f616d7e23cca635d65d66829cb8b
SHA512447e8ca8db6380f1192e2e02617f33c34d8dd76062c0f31344fa133c981c0ea09e286d63851774575e53719beb6ba2cdef3dfe7c8536953f7589aa0c2e9fe8b6
-
Filesize
4.7MB
MD5fbf840556e216313d7bff3102c48a5aa
SHA1a489b16ce474eb8fd5bd0cb2aa19416e171d9fcb
SHA25665ec5804537d04c5c4b987e254cdd3c877159ed421ed332f7266a344ca1f54c6
SHA512338d752f4606dd4d50cf86fa6fc82448cdacfed49957b473fa4c90be5646731248c8619ccd1a8e979d1475c5acdd946423ecc951ca50c16f30fe44b2431ddb63