Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 13:12
Behavioral task
behavioral1
Sample
137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe
-
Size
134KB
-
MD5
137d0d610541ee95dda97be7861ad5fc
-
SHA1
42e7c5b0c07e1acc6feb983f68b13448dd1a7c44
-
SHA256
dc43c59e0b8abb1af31ad08e334d1cdfe8a57e2fe1e73779786cb76616afe4b0
-
SHA512
3bd2720982207872dfe57787caac2b3f1dac5d4c9088e89d031f49831b03927cae98d888731968b9bd660c3ca9c90f090b6beccd4bf7d37f883eb4281a08950e
-
SSDEEP
3072:lL1SE8b1R1Fw6qPrZZGa68rBSf77Ul09z7AeF:Z1SE8l6LHGa6gk77UloMeF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2108 Obezya.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\KCSCPW1HKH = "C:\\Windows\\Obezya.exe" Obezya.exe -
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x0007000000016d3a-9.dat upx behavioral1/memory/2108-11-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe File created C:\Windows\Obezya.exe 137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe File opened for modification C:\Windows\Obezya.exe 137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obezya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International Obezya.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main Obezya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe 2108 Obezya.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2108 2172 137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe 30 PID 2172 wrote to memory of 2108 2172 137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe 30 PID 2172 wrote to memory of 2108 2172 137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe 30 PID 2172 wrote to memory of 2108 2172 137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\137d0d610541ee95dda97be7861ad5fc_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\Obezya.exeC:\Windows\Obezya.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5137d0d610541ee95dda97be7861ad5fc
SHA142e7c5b0c07e1acc6feb983f68b13448dd1a7c44
SHA256dc43c59e0b8abb1af31ad08e334d1cdfe8a57e2fe1e73779786cb76616afe4b0
SHA5123bd2720982207872dfe57787caac2b3f1dac5d4c9088e89d031f49831b03927cae98d888731968b9bd660c3ca9c90f090b6beccd4bf7d37f883eb4281a08950e
-
Filesize
372B
MD53b9ab7dfa66c454d090721fa890789eb
SHA11f87596c980ad078fb9df4a12efceb100198b222
SHA2561c444073174c009a9a042464adab1573723e45e761ac0961b79ce498b70841cd
SHA5124df78051d1a526d4408d2e45a0cb6cb7f1f5d0cff827291c30ae25c864317de44cc3d80d43fe482d7c15b131b849f6fed16abb184e47ad914a624b0c6b55ee75