Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe
-
Size
158KB
-
MD5
0f340583a4ee284caf16e05d3cc00024
-
SHA1
b56222d2f9f5e0d688340d0ac3a6473f72129d32
-
SHA256
10666748e8acf3269a93f868301eeddcfb4a2f3228e2ea1328f8a519d6bce7e2
-
SHA512
11b280891b386a049564f270e4e04412f7e6a9f1c8ede0bb0584c67405df329862f1b823da69550da90f2b9def9543d208ff007e651c619c03ec538115c94e01
-
SSDEEP
3072:4TEGsN2+2kmBWLhHrXYnj3NJbVI3Gbf0Yd6zCNrtehH/CsQgSsDxd:KsNnVUSrGzLbVI3+KCNAFBQO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2152 Zfetaa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\K8CE6CA1JO = "C:\\Windows\\Zfetaa.exe" Zfetaa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe File created C:\Windows\Zfetaa.exe 0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe File opened for modification C:\Windows\Zfetaa.exe 0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zfetaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main Zfetaa.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International Zfetaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe 2152 Zfetaa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2152 Zfetaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2152 2452 0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2152 2452 0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2152 2452 0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2152 2452 0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f340583a4ee284caf16e05d3cc00024_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\Zfetaa.exeC:\Windows\Zfetaa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD516db844341c43843a47a8d6553326d76
SHA1eca1c26afad48fb4b890ecf7045ea69fe8e04f03
SHA256c487fa0a078d2f207319d55dc3e5b8cf807de37d4bc7bee578c150013a026dad
SHA5127ed5e2f62065d1ec3cb17b9d0f612a90c34d1e757a5aca8bc554af701b5198c48d4ac77e73df89e0f3b1db2ff39344188cdc6f9b0fbbb4e8943528404ae2d023
-
Filesize
158KB
MD50f340583a4ee284caf16e05d3cc00024
SHA1b56222d2f9f5e0d688340d0ac3a6473f72129d32
SHA25610666748e8acf3269a93f868301eeddcfb4a2f3228e2ea1328f8a519d6bce7e2
SHA51211b280891b386a049564f270e4e04412f7e6a9f1c8ede0bb0584c67405df329862f1b823da69550da90f2b9def9543d208ff007e651c619c03ec538115c94e01