Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe
-
Size
236KB
-
MD5
109b6a66878c4b1310f607c3b215bbe2
-
SHA1
4dc19d05b6b622ff9db30ce28ad99adda7d1d54e
-
SHA256
72df28bf5d9494ea2ca557a1117c8efcc671d39bc0c0bb401785796136c33b6e
-
SHA512
13ac357e343f9d8fe05e9ab2b5c7ac58a8d1c2dc3d56d45e59928de293d51e55d4479390d9c4a6b02c67ee751dbc12eb04e710964c081e07cafb5817884528c7
-
SSDEEP
6144:WIEaeNJ3XTBcdoRs8kJdhnnsIW2Y/m+0HXEjtra:PEao3DB4oy8wdhnns3p+utO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 268 uninst1.exe -
Loads dropped DLL 5 IoCs
pid Process 3008 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe 3008 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe 3008 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe 268 uninst1.exe 268 uninst1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3008 wrote to memory of 268 3008 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe 31 PID 3008 wrote to memory of 268 3008 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe 31 PID 3008 wrote to memory of 268 3008 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe 31 PID 3008 wrote to memory of 268 3008 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe 31 PID 3008 wrote to memory of 268 3008 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe 31 PID 3008 wrote to memory of 268 3008 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe 31 PID 3008 wrote to memory of 268 3008 109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\109b6a66878c4b1310f607c3b215bbe2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\uninst1.exeC:\Users\Admin\AppData\Local\Temp\uninst1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD58757cd8c68b85d668f15befc13251d5e
SHA14ac9df9e507727072644e03815ab2f872e72fd89
SHA25696d1906ef8f1ac224830da79bc9492aa21ffbacd4caa4fb44cc64dedf09047a2
SHA5129a3286826d1ce780ce699dfd8d1244a94ce8700a89c75f2dbcfbae19e8609d243754067385364bdecb91e9108c11c062564e2d045652977faaf2e92d129b1a4a
-
Filesize
60KB
MD5ceb49a8552067f2b08c93aaa38da3d12
SHA17f4275ced86f448eb29f0b26cf5fe86fe43c783f
SHA256904b926c5359a4058a80057cdc4bed4c0be43c2e1c8993e870cbab69831a84b4
SHA512d2a593bc04a3497b7cfbfd2a89add0dbf87f1e2fd159af9b44155cf3d35e16b3a4ae7ada194db94258385c5b9de49abb1e3ad8d26cbfc444d03798433e8e843d
-
Filesize
236KB
MD5bc8f887820d197a12a1970b0fa9357e3
SHA149d916bf5199c26fd077729376ea8142ad40ae3d
SHA256e8355f2501167ccc1a41e985d773a2864e70c8a995ee57dfba767367fbdacc3f
SHA5125e3ff64fb796a83701ab3273f0bd66733e1975567175424fefddf74973a3e3884c996559f531c6f7f1a633ed09ac2939f9cb836e7a133c820664a2992d289d63