Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 01:46
Behavioral task
behavioral1
Sample
0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
0d5b155b7719018461a3e45e6636ef47
-
SHA1
4cca77f066f4753ee94a4b997a10c982343754b7
-
SHA256
a1060addacd33c1fd2d05244b1b6fbaf8e587787ad5acf099019c13992d280a3
-
SHA512
93321bdfc14255914b3a5a1234db27024cb912b9b93b85c943db6b59860b52adcc63d292d5782614671de2872654810b5fcb497cabd37097773eac8622cf109f
-
SSDEEP
24576:APNoNHauKFZstGcxroBII8drIT4WVr9UAOcOrzL3oiWw1f+AUL0eC:Alo9aue0XkBTr9wcOr3421d/eC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2916 IFinst27.exe -
resource yara_rule behavioral1/memory/2696-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2696-7-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0007000000012117-5.dat upx behavioral1/memory/2916-28-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2916-133-0x0000000000400000-0x000000000042B000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\IFinst27.exe 0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IFinst27.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2916 2696 0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2916 2696 0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2916 2696 0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2916 2696 0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\IFinst27.exe"C:\Windows\IFinst27.exe" -IC:\Users\Admin\AppData\Local\Temp\0d5b155b7719018461a3e45e6636ef47_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD515b063da86e682f6aaf831c0eb584a80
SHA1f7f7529265d749ae1bd511eb6630473e8091751c
SHA256c0b8d4b72fa1f975f8681b7eccb80702fdb331d07e4f0689070cd5a383f5e50a
SHA512975d12789f2af4a75c842b44b36a52b1a632ad51fd4da2e6511757cd406cb68bf23c5a55890d034d3826a350a4b7f443bf81cc04b96cb9cbaa0d104be8b4290c
-
Filesize
516B
MD568a312b99a0515558c98db674ce4e0be
SHA108618924cd599607a2760bb9d88eb6ce7e7b47fe
SHA25635fef92d7f7c4b2fd8b5f0cecffec91ef87da3afa605d9d5f01c7709ca7426fd
SHA5126f23d973dbf3f99f5d2a499e58a9905c42d6d13981a3a9440d5349dd399291158d466cae6ac2b27ff1b0eca1a7eb6842d1502f54703f625adad827b67065884d
-
Filesize
657B
MD5c6e38cc62dcef643a0b3aa9304eaf410
SHA18657c06b4f9724c1d3de6d0f5cef47b35b5aceed
SHA2565e1d359f32d274b1fce81d89e1b4788f900709f074e99dec0fedd4f2fa2ecb3d
SHA51264e4470cd578fb1779126dc0e15734ac770cd7fff8ccb1641db69250aed449225186840b62ef62d2f5c6d9702fc6b3d78258e487e668c3150a1a2fdcef7f30e9
-
Filesize
67B
MD5135ba9f81232761d5c24a5d2e4c98bf9
SHA12f815004c87bf2accd1b51d7b67a9898d6b53fd5
SHA256d611934007dedee35797eea1cbeb2501f90baaa9159f9603a0740ebac826d20e
SHA5126fd00957cc02759f0e98b6f963a659b75cf04c9344ec52ca103cc4fd056a0facb0d5d27d9b67a98333bc097ed383b46b55ee8bb252b210e1aac19a4e48b4186a
-
Filesize
64KB
MD59c17bca3ef837bacded7e4299508e71d
SHA1253c7e956ad6cb66e0e47e5d9a6a19d78e9c96e0
SHA2562405e5479aeb7d43d1362969b9c439e5931b8f900f9adfe0faaa986365415193
SHA51212c1c5dbdf763d6d361b9d412794b0d85b6134843114120b843f30db198a3a211e2c06eadd3ed25271b4cd06a7367df7dafc6b9b33b1bce479f3ad050caeb625