Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:22
Behavioral task
behavioral1
Sample
083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
083b44615f4858b75388d2447f19cc9b
-
SHA1
2cd44ab4ca2714964e5566ee2b208d462d985140
-
SHA256
a1c033d050f9e60f87abe71a9b14a85b747bbaf2abbea3bc0c766b76bfd5f8cf
-
SHA512
ab2e02ec0f16b9f4188be1c466675fafde29d1345864639a135b7fad22bb7328c78d439b3340f0b2368c8ec70649d406737a66e4e7b937a1bdf5e002a6703a0a
-
SSDEEP
49152:Wpa0rE0om3z7pU9Sz0HiXXjwwv8Jrl8CxdXIXR7AUU9Sz0HiXXjwwv8Jr:Wpa0Lom3z7pU9Sz0UXjwwv8Jr+sdXIh+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2104 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
resource yara_rule behavioral1/memory/2104-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/3060-18-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x00080000000120f4-16.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2016 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2104 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2104 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3060 2104 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 31 PID 2104 wrote to memory of 3060 2104 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 31 PID 2104 wrote to memory of 3060 2104 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 31 PID 2104 wrote to memory of 3060 2104 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 31 PID 3060 wrote to memory of 2016 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2016 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2016 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2016 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2684 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 34 PID 3060 wrote to memory of 2684 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 34 PID 3060 wrote to memory of 2684 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 34 PID 3060 wrote to memory of 2684 3060 083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe 34 PID 2684 wrote to memory of 2880 2684 cmd.exe 36 PID 2684 wrote to memory of 2880 2684 cmd.exe 36 PID 2684 wrote to memory of 2880 2684 cmd.exe 36 PID 2684 wrote to memory of 2880 2684 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\083b44615f4858b75388d2447f19cc9b_JaffaCakes118.exe" /TN C6zfbKp75e99 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2016
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN C6zfbKp75e99 > C:\Users\Admin\AppData\Local\Temp\KKZ8R5.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN C6zfbKp75e994⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5feb77637ac1db203b8aa770d964d5e20
SHA11c6bde877b6d34f430dd7bc415dafff98ea49579
SHA25630444c303a7ec278c7b477be8988802ec95083d17f333ab742709c1b541900ea
SHA512a14e2ecb346df09c19a551663eb4118463ce8a41c95093e2bcc024c00b84a0a2576bffc5aa95bac5bd6cbdc2501f1a3b290e8eaf59a19766150008eb10d85929
-
Filesize
1KB
MD53599942b1825be96d7a4ecab1f558d21
SHA17f5e1828da222d9ac351d7a8ab13f47436b2570b
SHA256bc761d2896537a35043da02b48753d02bed02c8477e3532b5a42c62e1c100118
SHA5121c47c09005fc863727a19b2b43e60518c6991c8ba7ce8a9f83f27e466067bddc2d35b592cfba67985e820f826596b8188a0da670bae5effe693a1303272a5523