Analysis
-
max time kernel
100s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 12:24
Behavioral task
behavioral1
Sample
fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe
-
Size
506KB
-
MD5
fe850b9cb64952e4ef425c2483f6e1e5
-
SHA1
859d625c454b1d706d45eff9b710032f4738b3cf
-
SHA256
89aa030be1bc8c352c1e639992143bf0f0b0471344dd24fa4a0c24d46971f996
-
SHA512
5d9e401b244ba9cc8bcdebe40595b5fbba7ea0cd57039209dae0c120b087d9abefb9ea82db06b278e817e845f8f29a8234c5bcd451f734fdffac5901481d5e7f
-
SSDEEP
6144:jaUhMk70XLC1t9N9/W76hVj+VD3hbcd5SVtY/nWMSqKMXGY/uqp:jqkeLCP9NyEma3l4fM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3356 Rpikea.exe -
resource yara_rule behavioral2/memory/3688-0-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral2/files/0x0007000000023433-10.dat upx behavioral2/memory/3356-14-0x0000000000400000-0x0000000000480000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Rpikea.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Rpikea.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe File created C:\Windows\Rpikea.exe fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe File opened for modification C:\Windows\Rpikea.exe fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 312120 3356 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rpikea.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main Rpikea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe 3356 Rpikea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3688 wrote to memory of 3356 3688 fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe 82 PID 3688 wrote to memory of 3356 3688 fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe 82 PID 3688 wrote to memory of 3356 3688 fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe850b9cb64952e4ef425c2483f6e1e5_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\Rpikea.exeC:\Windows\Rpikea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 9043⤵
- Program crash
PID:312120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3356 -ip 33561⤵PID:312088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5fe850b9cb64952e4ef425c2483f6e1e5
SHA1859d625c454b1d706d45eff9b710032f4738b3cf
SHA25689aa030be1bc8c352c1e639992143bf0f0b0471344dd24fa4a0c24d46971f996
SHA5125d9e401b244ba9cc8bcdebe40595b5fbba7ea0cd57039209dae0c120b087d9abefb9ea82db06b278e817e845f8f29a8234c5bcd451f734fdffac5901481d5e7f
-
Filesize
390B
MD5802777cb21d8b3d8759f849c4752ec1f
SHA1034a3550fa81ea7770c9f24f17396315a9f34b74
SHA256b851912b37b50aa696475c02f57eb9a80d15e8ad1854d35d808983d13200cd8f
SHA5121dc04f7caf8ae582c403c7163299291884b383d0a7757abd751eff539b0b065f13781c3d29daa7aa3262cb2e510613bff303a4205b8ec77a7bce6de1fe4f2253