Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
02551d75d70f171b439fad2e006cbf50_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02551d75d70f171b439fad2e006cbf50_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02551d75d70f171b439fad2e006cbf50_JaffaCakes118.exe
-
Size
391KB
-
MD5
02551d75d70f171b439fad2e006cbf50
-
SHA1
9dee8b870f87a9060fe8d6f176b05f723c7e6ab1
-
SHA256
1ca1465a6dc5fffa7ecb883fec658d1bd418cccc67cc1de7e809acd685dfd1fb
-
SHA512
1a68cc9439e90da907410372ab6f0bc5e8dae006d4f25a8c286e9fee76f904ad90e8c23ee9eba4a4b7a85ca1b4a9897f5ca6c64dcefb7b0b50cdb7f241e2ada5
-
SSDEEP
6144:IiV3M7tydyE7ztsY4yTr8bjeJwj2EItHp4Pl6yzh0H0xH9NDDOfHvAQ6AyLrFX:Iu3URWtsYf8PemjE8h0UxH9ND6fvha
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2720 dxphjxh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dxphjxh.exe 02551d75d70f171b439fad2e006cbf50_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\yocgcxd.dll dxphjxh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02551d75d70f171b439fad2e006cbf50_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxphjxh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1152 02551d75d70f171b439fad2e006cbf50_JaffaCakes118.exe 2720 dxphjxh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2720 2780 taskeng.exe 32 PID 2780 wrote to memory of 2720 2780 taskeng.exe 32 PID 2780 wrote to memory of 2720 2780 taskeng.exe 32 PID 2780 wrote to memory of 2720 2780 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\02551d75d70f171b439fad2e006cbf50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02551d75d70f171b439fad2e006cbf50_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1152
-
C:\Windows\system32\taskeng.exetaskeng.exe {06399124-8482-43F5-832C-21C753681FF5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\PROGRA~3\Mozilla\dxphjxh.exeC:\PROGRA~3\Mozilla\dxphjxh.exe -wyqgbfl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5e3267c3ce45b1a27340cbb6ce2ccbf5c
SHA1986b4fbb33abd63714050c7691e5d599a2171817
SHA256fb5e4f6afaf746f076df648bfaf4f1b1b6bd3c097c14b49dd76992de607612fa
SHA5128eb883a6b717573313605c851963308856801d9e3067f07fd7e701ffa87e03685a188d6fe309a242b7800a734f0bd58080a2b63de90200a1086315479ccf9ad9