Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 15:26
Behavioral task
behavioral1
Sample
fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe
-
Size
84KB
-
MD5
fc974d62c90f8074a9a7895c7f88104a
-
SHA1
80d9daedcad45585f6151aedcb5988cfeda192fb
-
SHA256
0b74cb9ebba0cf222cb5d393458208ac7ddde08f07c3a80681e19efe3c380743
-
SHA512
56d53ad41a3c5330a5b6343b2a6551c42efd0cf2a0e103f3489a751202b88feb7487598199d6428ca08a9d7173e4ab0fa745e6cc01fd9982bcfb865e3e606da9
-
SSDEEP
1536:mG4O2brychFx2t5ZldLKFe1uVZk1vQIQIro9xqzyJvBR+U2qPgMoE6W5u2Ib:mGB2brtEJce1un+ro9xuyJJ52UBoEL56
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2316 sysinfos.exe 2920 sysinfos.exe 1396 sysinfos.exe 2304 sysinfos.exe 1484 sysinfos.exe 2312 sysinfos.exe 2172 sysinfos.exe 1204 sysinfos.exe 1604 sysinfos.exe 916 sysinfos.exe -
Loads dropped DLL 20 IoCs
pid Process 2440 fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe 2440 fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe 2316 sysinfos.exe 2316 sysinfos.exe 2920 sysinfos.exe 2920 sysinfos.exe 1396 sysinfos.exe 1396 sysinfos.exe 2304 sysinfos.exe 2304 sysinfos.exe 1484 sysinfos.exe 1484 sysinfos.exe 2312 sysinfos.exe 2312 sysinfos.exe 2172 sysinfos.exe 2172 sysinfos.exe 1204 sysinfos.exe 1204 sysinfos.exe 1604 sysinfos.exe 1604 sysinfos.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File created C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File created C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File created C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File created C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File created C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File created C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File created C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File created C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File created C:\Windows\SysWOW64\sysinfos.exe fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File created C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe File opened for modification C:\Windows\SysWOW64\sysinfos.exe sysinfos.exe -
resource yara_rule behavioral1/memory/2440-2-0x0000000000400000-0x00000000004D4E4B-memory.dmp upx behavioral1/files/0x0007000000012116-13.dat upx behavioral1/memory/2920-26-0x0000000000400000-0x00000000004D4E4B-memory.dmp upx behavioral1/memory/2920-34-0x0000000002990000-0x0000000002A65000-memory.dmp upx behavioral1/memory/1204-84-0x0000000000400000-0x00000000004D4E4B-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfos.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2316 2440 fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2316 2440 fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2316 2440 fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2316 2440 fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2920 2316 sysinfos.exe 32 PID 2316 wrote to memory of 2920 2316 sysinfos.exe 32 PID 2316 wrote to memory of 2920 2316 sysinfos.exe 32 PID 2316 wrote to memory of 2920 2316 sysinfos.exe 32 PID 2920 wrote to memory of 1396 2920 sysinfos.exe 33 PID 2920 wrote to memory of 1396 2920 sysinfos.exe 33 PID 2920 wrote to memory of 1396 2920 sysinfos.exe 33 PID 2920 wrote to memory of 1396 2920 sysinfos.exe 33 PID 1396 wrote to memory of 2304 1396 sysinfos.exe 34 PID 1396 wrote to memory of 2304 1396 sysinfos.exe 34 PID 1396 wrote to memory of 2304 1396 sysinfos.exe 34 PID 1396 wrote to memory of 2304 1396 sysinfos.exe 34 PID 2304 wrote to memory of 1484 2304 sysinfos.exe 35 PID 2304 wrote to memory of 1484 2304 sysinfos.exe 35 PID 2304 wrote to memory of 1484 2304 sysinfos.exe 35 PID 2304 wrote to memory of 1484 2304 sysinfos.exe 35 PID 1484 wrote to memory of 2312 1484 sysinfos.exe 36 PID 1484 wrote to memory of 2312 1484 sysinfos.exe 36 PID 1484 wrote to memory of 2312 1484 sysinfos.exe 36 PID 1484 wrote to memory of 2312 1484 sysinfos.exe 36 PID 2312 wrote to memory of 2172 2312 sysinfos.exe 37 PID 2312 wrote to memory of 2172 2312 sysinfos.exe 37 PID 2312 wrote to memory of 2172 2312 sysinfos.exe 37 PID 2312 wrote to memory of 2172 2312 sysinfos.exe 37 PID 2172 wrote to memory of 1204 2172 sysinfos.exe 38 PID 2172 wrote to memory of 1204 2172 sysinfos.exe 38 PID 2172 wrote to memory of 1204 2172 sysinfos.exe 38 PID 2172 wrote to memory of 1204 2172 sysinfos.exe 38 PID 1204 wrote to memory of 1604 1204 sysinfos.exe 39 PID 1204 wrote to memory of 1604 1204 sysinfos.exe 39 PID 1204 wrote to memory of 1604 1204 sysinfos.exe 39 PID 1204 wrote to memory of 1604 1204 sysinfos.exe 39 PID 1604 wrote to memory of 916 1604 sysinfos.exe 40 PID 1604 wrote to memory of 916 1604 sysinfos.exe 40 PID 1604 wrote to memory of 916 1604 sysinfos.exe 40 PID 1604 wrote to memory of 916 1604 sysinfos.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\sysinfos.exeC:\Windows\system32\sysinfos.exe 456 "C:\Users\Admin\AppData\Local\Temp\fc974d62c90f8074a9a7895c7f88104a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\sysinfos.exeC:\Windows\system32\sysinfos.exe 508 "C:\Windows\SysWOW64\sysinfos.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\sysinfos.exeC:\Windows\system32\sysinfos.exe 520 "C:\Windows\SysWOW64\sysinfos.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\sysinfos.exeC:\Windows\system32\sysinfos.exe 512 "C:\Windows\SysWOW64\sysinfos.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\sysinfos.exeC:\Windows\system32\sysinfos.exe 528 "C:\Windows\SysWOW64\sysinfos.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\sysinfos.exeC:\Windows\system32\sysinfos.exe 516 "C:\Windows\SysWOW64\sysinfos.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\sysinfos.exeC:\Windows\system32\sysinfos.exe 524 "C:\Windows\SysWOW64\sysinfos.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\sysinfos.exeC:\Windows\system32\sysinfos.exe 532 "C:\Windows\SysWOW64\sysinfos.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\sysinfos.exeC:\Windows\system32\sysinfos.exe 536 "C:\Windows\SysWOW64\sysinfos.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\sysinfos.exeC:\Windows\system32\sysinfos.exe 540 "C:\Windows\SysWOW64\sysinfos.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:916
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5fc974d62c90f8074a9a7895c7f88104a
SHA180d9daedcad45585f6151aedcb5988cfeda192fb
SHA2560b74cb9ebba0cf222cb5d393458208ac7ddde08f07c3a80681e19efe3c380743
SHA51256d53ad41a3c5330a5b6343b2a6551c42efd0cf2a0e103f3489a751202b88feb7487598199d6428ca08a9d7173e4ab0fa745e6cc01fd9982bcfb865e3e606da9