Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 23:39
Behavioral task
behavioral1
Sample
15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe
-
Size
237KB
-
MD5
15559387597230c4981bea1d5b6443f2
-
SHA1
094a86b7ed7791b1d36e474e99f168f9e8c53329
-
SHA256
a807950a9f22b71b1c95684643ddc3c7cf1996a335af6cffb78ed9e2b5d5f4c0
-
SHA512
43bbd299b882cd8d27cc64ac31447306c9af5cd77454380489c36cd591ba39bd61bc9c1ef54b09b19d562b7be3cb1b8f4da73947106382b130b928d1d9d05afa
-
SSDEEP
6144:pY8vvEA36yTHZHRmksKprK4FLeeM6Mhh6lKMEKQ8IRL:pYFeBTHGEr7FLeeM6aME7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4532 Psudea.exe -
resource yara_rule behavioral2/memory/3136-0-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral2/memory/3136-1-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral2/memory/3136-4-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral2/files/0x000700000002346c-13.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Psudea.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Psudea.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe File created C:\Windows\Psudea.exe 15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe File opened for modification C:\Windows\Psudea.exe 15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 74928 4532 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Psudea.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main Psudea.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe 4532 Psudea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4532 3136 15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe 82 PID 3136 wrote to memory of 4532 3136 15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe 82 PID 3136 wrote to memory of 4532 3136 15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15559387597230c4981bea1d5b6443f2_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\Psudea.exeC:\Windows\Psudea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 9123⤵
- Program crash
PID:74928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4532 -ip 45321⤵PID:35592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD515559387597230c4981bea1d5b6443f2
SHA1094a86b7ed7791b1d36e474e99f168f9e8c53329
SHA256a807950a9f22b71b1c95684643ddc3c7cf1996a335af6cffb78ed9e2b5d5f4c0
SHA51243bbd299b882cd8d27cc64ac31447306c9af5cd77454380489c36cd591ba39bd61bc9c1ef54b09b19d562b7be3cb1b8f4da73947106382b130b928d1d9d05afa
-
Filesize
390B
MD5eff53ff4874e298b0331d7fe8367ebf9
SHA1a014cdb85d1bc8062ceccc1ca3e1fc67d0000784
SHA256425e7c7ec77360cb0c901494cecac1f24660c7a1b4d7dc68dc002261ed33c2aa
SHA51284d5112bc72cf6d0c975545860a0b69a3aa07efd65cd31f3971c46b57cf9d092486b9262af656c87499129e2e79661ee959e8357751db763079657997a01fb16