Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 03:14
Static task
static1
Behavioral task
behavioral1
Sample
119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe
-
Size
218KB
-
MD5
119b57bab0e7f76b68d24c3efec9031b
-
SHA1
2d88f79e28ed8411e9b586072c8e172fab880a2b
-
SHA256
f550aec5e8956305d5679e22df073099ddcc67ae6f8f8ce35f16f2768a70762d
-
SHA512
55e1ea27c0087688f25e1cc6067b54f9719f3310343f780e47534da7813954076d9e8dd7dc3da0427542ff0b626ef3f2eb2e318c74c036cde65da138542ace38
-
SSDEEP
3072:OwR5g46PJhr+dXwfFC1rDbXCxYqN/GXwPQlLl4V1oxYBBvB7VFCGWgLA9ovkNGqx:/R2zP+yfFCJDT2b/FQlS9Z7zfLwlQsF1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2720 32.exe 2944 QvodSetupPlus3.exe -
Loads dropped DLL 12 IoCs
pid Process 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 2720 32.exe 2720 32.exe 2720 32.exe 2944 QvodSetupPlus3.exe 2944 QvodSetupPlus3.exe 2944 QvodSetupPlus3.exe 2140 WerFault.exe 2140 WerFault.exe 2140 WerFault.exe -
resource yara_rule behavioral1/files/0x0008000000016edb-24.dat upx behavioral1/memory/2944-29-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2944-37-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2944-38-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2944-39-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2944-40-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2944-42-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2944-44-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2944-45-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2944-47-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2944-49-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2944-50-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2140 2720 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QvodSetupPlus3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2944 QvodSetupPlus3.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2944 QvodSetupPlus3.exe 2944 QvodSetupPlus3.exe 2944 QvodSetupPlus3.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2944 QvodSetupPlus3.exe 2944 QvodSetupPlus3.exe 2944 QvodSetupPlus3.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2720 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 30 PID 2224 wrote to memory of 2720 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 30 PID 2224 wrote to memory of 2720 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 30 PID 2224 wrote to memory of 2720 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 30 PID 2224 wrote to memory of 2720 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 30 PID 2224 wrote to memory of 2720 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 30 PID 2224 wrote to memory of 2720 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 30 PID 2224 wrote to memory of 2944 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2944 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2944 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2944 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2944 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2944 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2944 2224 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2140 2720 32.exe 32 PID 2720 wrote to memory of 2140 2720 32.exe 32 PID 2720 wrote to memory of 2140 2720 32.exe 32 PID 2720 wrote to memory of 2140 2720 32.exe 32 PID 2720 wrote to memory of 2140 2720 32.exe 32 PID 2720 wrote to memory of 2140 2720 32.exe 32 PID 2720 wrote to memory of 2140 2720 32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\32.exe"C:\Users\Admin\AppData\Local\Temp\32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 2523⤵
- Loads dropped DLL
- Program crash
PID:2140
-
-
-
C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.exe"C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5bfe6737ba6596a5fdf2a049e2173cddc
SHA17da5eee868fe5b852f6abb932da4af8d4d63eeaf
SHA25601dc2e67b874b3a40cd5f06aac4c64313182817da5f5049059e02d1d88d5e1ec
SHA512e09d9f9e774efc78d7c432a836e439d5613733be058498eae8bca6e41bbec6705c1010dc993c65f84bebf5cb53d9f2af7fde89de7cd8f0509901ca4d1c9d92e2
-
Filesize
149KB
MD57d5ce902a450ed732377cedc8fd69ed3
SHA11032e0f88a6224d08b342b145adc753b3b5de7b9
SHA256ce357b4fad92329cc26793198d839ea3c5f8f132fd7b6f76a2778d455a1e8ec4
SHA512e54684c8645ef307b3dc77bad6c863da7dea4aab9caeb47f3087743e331dde03b462154a1a5e2f54aee0807abad81fa5685e586bed15d7750a5f7dd9556258c1