Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe
-
Size
324KB
-
MD5
fe3a11b3a1498562e823ab572b107b4f
-
SHA1
2eda010295cfdc973d609fa73e4fbb0727533cef
-
SHA256
52ed0bbd431147ec739f7b72a98986427b92514c60e145032190be51af883add
-
SHA512
7835203fb541ead0c63a0e0860abf734e797ffbaa8980b711c11c980cc3a7b0c5cbc5fdec8e3cf40c12732e64bb136c7ead25f89d520db7305eacc062fd3de37
-
SSDEEP
6144:fDS3rZRhI966AGkAjOpoaY7DB5QPDA7UbamnY:rS3Fq6xGJOpqUPDA7Umx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2604 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2204 wtix.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wtix.exe fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wtix.exe fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wtix.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2604 2972 fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe 32 PID 2972 wrote to memory of 2604 2972 fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe 32 PID 2972 wrote to memory of 2604 2972 fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe 32 PID 2972 wrote to memory of 2604 2972 fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe3a11b3a1498562e823ab572b107b4f_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.execmd /c .\delmeexe.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\wtix.exeC:\Windows\SysWOW64\wtix.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235B
MD5c396aba7ee8457744052d5503196eeda
SHA1b5ce7055cd104ed5b713630884fb52e48afd93e9
SHA2567733917beda88431505248453a3af424928b56c72373de0fe47af5876bda96e9
SHA512ccdd66b6748eacd97a533f745ef444792429aaf1ca35b0001550ff82cc1056e8d9cfb8bd88c7d8886e4d0b070226541e9d5554f48f55f297569e0abdd7734d44
-
Filesize
324KB
MD5fe3a11b3a1498562e823ab572b107b4f
SHA12eda010295cfdc973d609fa73e4fbb0727533cef
SHA25652ed0bbd431147ec739f7b72a98986427b92514c60e145032190be51af883add
SHA5127835203fb541ead0c63a0e0860abf734e797ffbaa8980b711c11c980cc3a7b0c5cbc5fdec8e3cf40c12732e64bb136c7ead25f89d520db7305eacc062fd3de37