Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
0a7dda5e0482655a76fedb57622f7b81_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0a7dda5e0482655a76fedb57622f7b81_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a7dda5e0482655a76fedb57622f7b81_JaffaCakes118.exe
-
Size
818KB
-
MD5
0a7dda5e0482655a76fedb57622f7b81
-
SHA1
0c56ff1de822f755ec92870b26d66d87bbf58de4
-
SHA256
670531da2b4992ca3610835c979bd0f7a688416adbe0b9264e5478d41103a618
-
SHA512
34b21299648b0650927f1de75090a16d7cb2e88b960529b88e39939a607fb221574aaf23cdf90e2100f84fe90996d5d26f03de3dfab2ff86235a6a0841c234f8
-
SSDEEP
12288:XQ4UIId51EgNsbSXc3KNLgqc7KVBP2ulll6kaW4lF3Z4mxxJDqVTVOCd:Xcv2b4Nzc7K6qQI4lQmXgVTzd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4376 VIP_VM~2.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a7dda5e0482655a76fedb57622f7b81_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 468 4376 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a7dda5e0482655a76fedb57622f7b81_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VIP_VM~2.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4376 4032 0a7dda5e0482655a76fedb57622f7b81_JaffaCakes118.exe 82 PID 4032 wrote to memory of 4376 4032 0a7dda5e0482655a76fedb57622f7b81_JaffaCakes118.exe 82 PID 4032 wrote to memory of 4376 4032 0a7dda5e0482655a76fedb57622f7b81_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a7dda5e0482655a76fedb57622f7b81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a7dda5e0482655a76fedb57622f7b81_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VIP_VM~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VIP_VM~2.EXE2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 5803⤵
- Program crash
PID:468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4376 -ip 43761⤵PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438KB
MD5b75bfb8e80469a65104c9ede7cc4651a
SHA174de26f61879a91f206e2e4419cb7c3410635567
SHA2564d92b9931764cc42a702134e1c188186182fbb2e162aa72fac06f2d335c79ed4
SHA512902340cecbd6375890b4cc1cd83c1ef8d12a48449e5079d57069cf1392e3b512b33ce07c8857b15021b390697b341ea4f4eb79872315730abf18a2dccb4df448