Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 02:44
Behavioral task
behavioral1
Sample
0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe
-
Size
51KB
-
MD5
0d8aea3bc10e80b5567b5e2a53f59050
-
SHA1
148fd54a1149c84209704317a19ba0462034b627
-
SHA256
022dd7b8f58a4d6b07ea97164583a024156e47fbe8a9c3ee2d718cb48167ac55
-
SHA512
bb2ad5c396b63615f1ad8708b753025b645afcb6b632b39e791c66c1d3b3aaff939942351ff6931060ea89cae8a5eb2e52a5bbee7656b3b2c0c3e6e196230833
-
SSDEEP
1536:33nReEAOSL+PIb1mCidtG9qi8uPY/EK6zkummb:3asw2tG938NFfum
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\wiucy.sys 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\wiucy.sys 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\jsfqva\ImagePath = "system32\\drivers\\wiucy.sys" 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe -
Loads dropped DLL 8 IoCs
pid Process 2376 rundll32.exe 2376 rundll32.exe 2376 rundll32.exe 2376 rundll32.exe 1844 Rundll32.exe 1844 Rundll32.exe 1844 Rundll32.exe 1844 Rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\owRM.dll 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\owRM.dll 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1064-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1064-16-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1844 Rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1844 Rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2376 1064 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe 30 PID 1064 wrote to memory of 2376 1064 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe 30 PID 1064 wrote to memory of 2376 1064 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe 30 PID 1064 wrote to memory of 2376 1064 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe 30 PID 1064 wrote to memory of 2376 1064 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe 30 PID 1064 wrote to memory of 2376 1064 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe 30 PID 1064 wrote to memory of 2376 1064 0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe 30 PID 2376 wrote to memory of 1844 2376 rundll32.exe 31 PID 2376 wrote to memory of 1844 2376 rundll32.exe 31 PID 2376 wrote to memory of 1844 2376 rundll32.exe 31 PID 2376 wrote to memory of 1844 2376 rundll32.exe 31 PID 2376 wrote to memory of 1844 2376 rundll32.exe 31 PID 2376 wrote to memory of 1844 2376 rundll32.exe 31 PID 2376 wrote to memory of 1844 2376 rundll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d8aea3bc10e80b5567b5e2a53f59050_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\owRM.dll,DllRegisterServer2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Rundll32.exeC:\Windows\system32\Rundll32.exe C:\Windows\system32\owRM.dll,DllUnregisterServer3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD57cc02c51f958dd6d6852b9b7ebf8b59d
SHA14495b80f2e7a73cfcade3d6a55e7ee8368915b57
SHA256defa6313a4298b0531d4917ccc3bc104f660097064433b566c727bd9d7e9e749
SHA512adad64cf849c5faa44cd99fd4f630bfd535adec029c3b83a7db1b66f3304ad5c9f114b020d4b587ead2c3db0912d15496491ac9cb269e4ea1df6062e56a5006f