Analysis
-
max time kernel
83s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 16:04
Behavioral task
behavioral1
Sample
14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe
-
Size
48KB
-
MD5
14080e96a6e65d2f9c28b38bc7a418a1
-
SHA1
2c71834535a98a5ad724952b4a9ea591af3a36d2
-
SHA256
ac6e772342ad01467777b7f52901b40f3e41b4741ef75be19fb39399527509e6
-
SHA512
127f00bedecdad7a28c4f748cf08c98c74e8ebb892feeefcc0bf3ce72498893749fad0c049c5c192288e73fd0704e214a22a9175fca25da2fdc564d40aa73982
-
SSDEEP
768:paUZctpPBac16DCdRtb9xYwmo3/+OtuDVHBknM3HhaAYjtrLt:/ctpMOd1qwt3GOkDVHBkMExtrZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1120 001678_x.exe -
Loads dropped DLL 2 IoCs
pid Process 2404 14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe 2404 14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2404-0-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x000a000000012250-2.dat upx behavioral1/memory/2404-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1120-12-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1120-13-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1120-14-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 001678_x.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1120 2404 14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe 29 PID 2404 wrote to memory of 1120 2404 14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe 29 PID 2404 wrote to memory of 1120 2404 14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe 29 PID 2404 wrote to memory of 1120 2404 14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14080e96a6e65d2f9c28b38bc7a418a1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\001678_x.exeC:\Users\Admin\AppData\Local\Temp\001678_x.exe del2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD514080e96a6e65d2f9c28b38bc7a418a1
SHA12c71834535a98a5ad724952b4a9ea591af3a36d2
SHA256ac6e772342ad01467777b7f52901b40f3e41b4741ef75be19fb39399527509e6
SHA512127f00bedecdad7a28c4f748cf08c98c74e8ebb892feeefcc0bf3ce72498893749fad0c049c5c192288e73fd0704e214a22a9175fca25da2fdc564d40aa73982