Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
109066be641aff1afff5f5ec8f04dbf0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
109066be641aff1afff5f5ec8f04dbf0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
109066be641aff1afff5f5ec8f04dbf0_JaffaCakes118.exe
-
Size
285KB
-
MD5
109066be641aff1afff5f5ec8f04dbf0
-
SHA1
7c51757479b11af07652aa252e30542f7f7a77ed
-
SHA256
5b9876f6a9f35a5b51fdbcbfcceb50c25658013e1833ad68bf57c8ffd6b3875d
-
SHA512
87a5ad6d584b19fcdf7fd29942d7601fcfa9f82bf844ac965acf078506725837c67ee36b31b64c89535832bbb8548a110b96adedcf8f7b02889fead4e259d5f2
-
SSDEEP
6144:y/Kod5J1iij6ijaGxmCAaMSbGqJ92rnxWXYbNS:M7DD2EESN2rBhS
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2280 qrggcen.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\qrggcen.exe 109066be641aff1afff5f5ec8f04dbf0_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\zwjbghb.dll qrggcen.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 109066be641aff1afff5f5ec8f04dbf0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrggcen.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2312 109066be641aff1afff5f5ec8f04dbf0_JaffaCakes118.exe 2280 qrggcen.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2280 2960 taskeng.exe 31 PID 2960 wrote to memory of 2280 2960 taskeng.exe 31 PID 2960 wrote to memory of 2280 2960 taskeng.exe 31 PID 2960 wrote to memory of 2280 2960 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\109066be641aff1afff5f5ec8f04dbf0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\109066be641aff1afff5f5ec8f04dbf0_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2312
-
C:\Windows\system32\taskeng.exetaskeng.exe {66847C06-E4DA-4307-973B-96BDAE049C32} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\PROGRA~3\Mozilla\qrggcen.exeC:\PROGRA~3\Mozilla\qrggcen.exe -cochpwl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5966babf152a94a9a781b2d71af47bac7
SHA1c229e936c597b8b67bb3e637def6cc14e2ecfd83
SHA25682edf4c20de7c04f2123ef189cde14710ab39edf92d810eefe84c97d7b808796
SHA512637e8e83bde0695a6fbf0a18d84c888124a2923256b55716ed168e5a8115fd345002604695d09dbcca4e0b31cf97c21adca43b50d1bfac91cd79ec4692a33125