Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe
-
Size
69KB
-
MD5
fc1290c7ffcc0908333a4784809dddd1
-
SHA1
15d3a575f86723da6f1a36fec5c5d6bd09b5fef7
-
SHA256
b2d5dc2f042613455e95eb037fabb3d2ebddc91c942fdf8684380d5dc8e745d4
-
SHA512
926221f4a6690e9611bbb61fd78ab468c42579f1f74aa8df706b0e07656cf8e6b0ffdf9dd2f50a1ee0387bf6de35a3c6c45df0d15002733ec1aa632e7bc48852
-
SSDEEP
768:QpKhsDIHkod6fQ55iLCU0zftxo9wX0+n6JMnB+C91UHs+9Kp96F6kIIw1Kos28Yu:3hLni90zfswXjaKLEsTWGSNhP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2684 jsdfgjdsfg.exe -
Loads dropped DLL 5 IoCs
pid Process 2536 fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe 2536 fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe 2400 WerFault.exe 2400 WerFault.exe 2400 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\jsdfgjdsfg.exe fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2400 2684 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsdfgjdsfg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2684 2536 fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2684 2536 fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2684 2536 fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2684 2536 fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2400 2684 jsdfgjdsfg.exe 32 PID 2684 wrote to memory of 2400 2684 jsdfgjdsfg.exe 32 PID 2684 wrote to memory of 2400 2684 jsdfgjdsfg.exe 32 PID 2684 wrote to memory of 2400 2684 jsdfgjdsfg.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc1290c7ffcc0908333a4784809dddd1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\jsdfgjdsfg.exe"C:\Windows\system32\jsdfgjdsfg.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 883⤵
- Loads dropped DLL
- Program crash
PID:2400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5b5a6d3851c366943055d62862833bb68
SHA1b6a2b4a9fd05593b826a43726909468a841f1c69
SHA2569549815e32db59e4bfb4e353846d0b6aef6763877ccfcfe3813c9c8246825207
SHA512eb26b73fe89cf24b87f34b301afeabe697d4cc7ebfc15179e8d1a8b65cb16f1d9d1b038c191462b0b3509209e3e316f19e209530e0418ef17b1a4e6e530bbcf8