Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 16:01
Behavioral task
behavioral1
Sample
066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe
-
Size
327KB
-
MD5
066fd26854b51d91d228bc370ef83faf
-
SHA1
d2f798954ac425f72b8dcfb42390161c6e5b215c
-
SHA256
e46fd684446165eb58472280ecb09ab1d594a6b1c15cce362fc48a50c9f2c580
-
SHA512
d94d7bece6865ceb4b927b446ffe88449ccdeff3551dcbe2a8367637c15cae1a056deeebb4a5da55fc00a7dfb3b82b766f5184a1d5b339c4a81412317b9876b2
-
SSDEEP
6144:ElZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lLIOBBL+XRe:EHLUMuiv9RgfSjAzRtyzBR2Re
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2064 logiciel.exe 2712 bqsd.exe -
Loads dropped DLL 4 IoCs
pid Process 2328 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe 2328 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe 2064 logiciel.exe 2064 logiciel.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2328-16-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bqsd.exe logiciel.exe -
resource yara_rule behavioral1/memory/2328-0-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral1/memory/2328-16-0x0000000000400000-0x00000000004B8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logiciel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqsd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2712 bqsd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2064 2328 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2064 2328 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2064 2328 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2064 2328 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2712 2064 logiciel.exe 32 PID 2064 wrote to memory of 2712 2064 logiciel.exe 32 PID 2064 wrote to memory of 2712 2064 logiciel.exe 32 PID 2064 wrote to memory of 2712 2064 logiciel.exe 32 PID 2712 wrote to memory of 1208 2712 bqsd.exe 21 PID 2712 wrote to memory of 1208 2712 bqsd.exe 21 PID 2712 wrote to memory of 1208 2712 bqsd.exe 21 PID 2712 wrote to memory of 1208 2712 bqsd.exe 21 PID 2712 wrote to memory of 1208 2712 bqsd.exe 21 PID 2712 wrote to memory of 1208 2712 bqsd.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\logiciel.exeC:\Users\Admin\AppData\Local\Temp/logiciel.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\bqsd.exe"C:\Windows\system32\bqsd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5759cbe38a439cb1e8a55d032f1864df7
SHA1f28c063d474f062beabc865abe09048b35cbd75b
SHA256f43a0e927f263ad7e4d1d0c881c2bb7acd1797253aad86614b7b867587348b22
SHA51287387820af37b59211f1310541daa0e78b69b73ad601df8e9a4cac932b8f5c519dbf742766473046268acc4fa80cc3e3e4d4491da9b70d3255bd79ea62eb671d
-
Filesize
53KB
MD534a5bf486fbf56f4afa7ec4112a93039
SHA1ab1798ddb387bfc0237cd796df12232d2ccb50bd
SHA256162d2d0fa4601458c8fb92b17404b6916b1f7950608179947a94f6c2362e6bd5
SHA5127e40361914524d4ba254edbb5c4d83087926e0a64cd8791dd31b88770bb43ed4a4075cb39b5187d8944df365c37d04251966bf9097cb34880e8980c7e89243ec