Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe
-
Size
14KB
-
MD5
04a6ac56418ed58ff297726d369817ac
-
SHA1
06d5798be725620259492c7e18adeb59c3016014
-
SHA256
c5a5bf9e193db3a4fdbd9ff6774820fda4129458c45b6ea03eb0c4d21bda1f1f
-
SHA512
bd13080a3771b90dc111e4867d5c38dadb78a98c665eea28d83d69e4b4e52bfac83f8e979b539dc694faf5af8787e86fb983d2d5f4805050e3993bf76115754a
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYq:hDXWipuE+K3/SSHgxmq
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2800 DEMF038.exe 2580 DEM4588.exe 2900 DEM9B17.exe 2620 DEMF048.exe 1840 DEM45A8.exe 2412 DEM9AD9.exe -
Loads dropped DLL 6 IoCs
pid Process 2644 04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe 2800 DEMF038.exe 2580 DEM4588.exe 2900 DEM9B17.exe 2620 DEMF048.exe 1840 DEM45A8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMF048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM45A8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMF038.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM4588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM9B17.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2800 2644 04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2800 2644 04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2800 2644 04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2800 2644 04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe 31 PID 2800 wrote to memory of 2580 2800 DEMF038.exe 33 PID 2800 wrote to memory of 2580 2800 DEMF038.exe 33 PID 2800 wrote to memory of 2580 2800 DEMF038.exe 33 PID 2800 wrote to memory of 2580 2800 DEMF038.exe 33 PID 2580 wrote to memory of 2900 2580 DEM4588.exe 35 PID 2580 wrote to memory of 2900 2580 DEM4588.exe 35 PID 2580 wrote to memory of 2900 2580 DEM4588.exe 35 PID 2580 wrote to memory of 2900 2580 DEM4588.exe 35 PID 2900 wrote to memory of 2620 2900 DEM9B17.exe 38 PID 2900 wrote to memory of 2620 2900 DEM9B17.exe 38 PID 2900 wrote to memory of 2620 2900 DEM9B17.exe 38 PID 2900 wrote to memory of 2620 2900 DEM9B17.exe 38 PID 2620 wrote to memory of 1840 2620 DEMF048.exe 40 PID 2620 wrote to memory of 1840 2620 DEMF048.exe 40 PID 2620 wrote to memory of 1840 2620 DEMF048.exe 40 PID 2620 wrote to memory of 1840 2620 DEMF048.exe 40 PID 1840 wrote to memory of 2412 1840 DEM45A8.exe 42 PID 1840 wrote to memory of 2412 1840 DEM45A8.exe 42 PID 1840 wrote to memory of 2412 1840 DEM45A8.exe 42 PID 1840 wrote to memory of 2412 1840 DEM45A8.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04a6ac56418ed58ff297726d369817ac_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\DEMF038.exe"C:\Users\Admin\AppData\Local\Temp\DEMF038.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\DEM4588.exe"C:\Users\Admin\AppData\Local\Temp\DEM4588.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\DEM9B17.exe"C:\Users\Admin\AppData\Local\Temp\DEM9B17.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\DEMF048.exe"C:\Users\Admin\AppData\Local\Temp\DEMF048.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\DEM45A8.exe"C:\Users\Admin\AppData\Local\Temp\DEM45A8.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\DEM9AD9.exe"C:\Users\Admin\AppData\Local\Temp\DEM9AD9.exe"7⤵
- Executes dropped EXE
PID:2412
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5df0775725304b3b795d75b1715992392
SHA1aa2eb363fd97e69905ef4e91f3001878059b014a
SHA256abe381934f1c8806c641517d6746c5167accac38a1d9a28a72ec822c757518fc
SHA512726ec8389e903b88a69c6ebe9f7af42e462628e2b7ffc3ca6e82207c187225acc70b6fbef795f7eff6a2ce977b2325949c6684b0ac63b02d0134fb1e4bb2cf61
-
Filesize
14KB
MD51d89ad610d56767080b0676d274a9972
SHA1b55154870c815e61470fc4795fa3c330404ba9d3
SHA256c64567ac3ff89df3aacbd7ad3af8021a23078a178f95b6d79494a0316bf7dcf9
SHA512a8434919c42093efbc77df08abd8f5558314364aefd2bc14081a3e0d702df946246a1bc4894fa104337412a8ed018de23684c49d6f3ffbb0b1013958bce95893
-
Filesize
14KB
MD57093838a15067e815d104a2a428cf6d8
SHA1e926d418c5a08cb563ded3ee02f9c35500dfa07e
SHA256ff47a968447c477a6eaa6a61b7120fbd72cc66eac351372525e3118e53df4434
SHA5125ad70a2a7ff17705fa3910d5d99b1697c9a7baf5d07044acb0be091cad1abbb5224f36fd64cf5805c57d03a88a07414edfe1fd93b575ebbcecfb88c14845265a
-
Filesize
14KB
MD54f51c1d3d5c9cc93c471bd54e211d55c
SHA1d775963228c47fb01d6f8689d95af979508908c0
SHA25627c37ef1ffdfc3ad525316865dfcf1a11f7498901d979150cd51389fffaf4e6a
SHA51256f7067abde4dcc77c9370cfc52365148716461aeb0de7cb6336d493cb02f7febbbe1613c67ba4717d66c5ea538e32ea05ff3c0b746c6685be38030d08fbae93
-
Filesize
14KB
MD53db937b50ad3f54865284f13ca65010d
SHA17204fc6a8735e5dc0b7b67ff40796183f1cf1eda
SHA2569d3d0d5fe793e8ed7120d9c66c79166fabb2acc95a09c4dda3c234d920fc0a13
SHA512b3d20097e1c486f185a626d0fb900c7d5af22584c98d2c1501f030fa5c3e4c598a2d1d4e906e998b17bfa4c155c2769d493fdc4cd1e10e94abec6a24bd4b4501
-
Filesize
14KB
MD5153584f9e9099191afafbe180d47135c
SHA12988396956e61067d7353a7227e9dbb4c70d7222
SHA2566bd015e1bf0e54c6ce59d6af3771213c0287e9fcf5df90406f85c57a2a7fb1ce
SHA512235de11a2fdb99aafaee60691dba650761bbc43163d662913d806a4682cf8aa53d699398d8c6f995dab342b66a9d3597c94158e90650158526459a5d7d2289cb