Analysis
-
max time kernel
19s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 07:06
Behavioral task
behavioral1
Sample
04cca346419520d224086da8e40cc984_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04cca346419520d224086da8e40cc984_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
General
-
Target
04cca346419520d224086da8e40cc984_JaffaCakes118.exe
-
Size
106KB
-
MD5
04cca346419520d224086da8e40cc984
-
SHA1
5fd29603973413d3628366aa1f10f3d686aec395
-
SHA256
6c5690f19baeff5afad2f867da3cbc6830fc2ba1c66046801434cca670b54df2
-
SHA512
4b4f897e222860319ae68844bd8d3430a93ac8add998da61f6c8d28b040381ad15dc3f8f0e2488d1318f274d01277766c86423cac551925b7e5f8e521346e805
-
SSDEEP
3072:RgQWixRJzNuQskn8xQ3WUu0/DaJP0Q/UkOq:RgWklxbL0Ad/v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1832 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 2540 04cca346419520d224086da8e40cc984_JaffaCakes118.exe 1832 Au_.exe -
resource yara_rule behavioral1/memory/2540-0-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/files/0x00070000000193b3-3.dat upx behavioral1/memory/1832-11-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2540-10-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1832-21-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1832-28-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04cca346419520d224086da8e40cc984_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1832 Au_.exe 1832 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1832 2540 04cca346419520d224086da8e40cc984_JaffaCakes118.exe 29 PID 2540 wrote to memory of 1832 2540 04cca346419520d224086da8e40cc984_JaffaCakes118.exe 29 PID 2540 wrote to memory of 1832 2540 04cca346419520d224086da8e40cc984_JaffaCakes118.exe 29 PID 2540 wrote to memory of 1832 2540 04cca346419520d224086da8e40cc984_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\04cca346419520d224086da8e40cc984_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04cca346419520d224086da8e40cc984_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
106KB
MD504cca346419520d224086da8e40cc984
SHA15fd29603973413d3628366aa1f10f3d686aec395
SHA2566c5690f19baeff5afad2f867da3cbc6830fc2ba1c66046801434cca670b54df2
SHA5124b4f897e222860319ae68844bd8d3430a93ac8add998da61f6c8d28b040381ad15dc3f8f0e2488d1318f274d01277766c86423cac551925b7e5f8e521346e805