Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe
-
Size
127KB
-
MD5
fc75f3106e631070d38e55a0d774683c
-
SHA1
35be2a709fea888c6392c4debcc2f98081f9df92
-
SHA256
0e3223d5793eb82603bca9a835f8ea90048ecee5856d761f1ea2f6366a83b54d
-
SHA512
fc2aa7846ca1c581804794ccbc62408cf58effc9bace045202010dbe6a9bb91a3521d7301d024d082e5896bcced98e39b78f9c9384cc022f945eae73f8072b39
-
SSDEEP
3072:+tFw8wzBh6/WBUJ0T5mLUrykmH1xBZkS+Kb:QFw8wzBhaEUJ45mnkmTBZkS+Kb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 D.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2796 D.exe 2796 D.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2796 2644 fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2796 2644 fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2796 2644 fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2796 2644 fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2796 2644 fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2796 2644 fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2796 2644 fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe 30 PID 2796 wrote to memory of 1208 2796 D.exe 21 PID 2796 wrote to memory of 1208 2796 D.exe 21 PID 2796 wrote to memory of 1208 2796 D.exe 21 PID 2796 wrote to memory of 1208 2796 D.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc75f3106e631070d38e55a0d774683c_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\D.exe"C:\D.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD587293e2519a048439199e57f858c2d3e
SHA13b279531092302259c1a134050a9cc89ab4c238e
SHA256e9f44af331e2ac8abf2c54475ebb8bafe280087b3ae0efc6721d5390dff28c6b
SHA51277618b4d9540217105a3829e69a3e6a397e129bf5ea8e0c31963bda8d2121bcc41aed01b3d1c8beba6eabde8eb494d448c8757d2820339f5c3cc7fab04bb3217