Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe
-
Size
33KB
-
MD5
0350cb66ff76cf531333a00bd9449415
-
SHA1
04a4d409d7e0669f08fc1a85f1b71b38832c5ead
-
SHA256
f6717f9d37a4b7426c72364411164990785f508dfea4955f5b987769f7d506c1
-
SHA512
46016e7a30d5fe9524785f9f265cf6e0fec63965b101458bc1fb328a5ee7880e9757a4c5cc07b9a917f5dbd6c0620bf300c393393a41ab0d83ebc7179a686407
-
SSDEEP
768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rh95kRjylylyl01:GY9jw/dUT62rGdiUOWWrNY1
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
Processes:
szgfw.exepid Process 2288 szgfw.exe -
Loads dropped DLL 2 IoCs
Processes:
0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exepid Process 1292 0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe 1292 0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exedescription pid Process procid_target PID 1292 wrote to memory of 2288 1292 0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe 31 PID 1292 wrote to memory of 2288 1292 0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe 31 PID 1292 wrote to memory of 2288 1292 0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe 31 PID 1292 wrote to memory of 2288 1292 0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0350cb66ff76cf531333a00bd9449415_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD53e7f7897ed7efca31990336ebdd1f41f
SHA122577480a17b3088056fa69c051c76b35c19cecf
SHA25651cd92dbbdb7d8f937da6f73d293529fec25cfde57204695c9b3b48e5fa7a66d
SHA5126695207bc738e7951ac96462f09774e480f1d4a04fd6185634d5be45cc300b856bf2e1ad63cc038fa2504dd1c9ca0b490dfb619d28a2b738f17a263560efda6b