Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
1460669a6569a4328c8be49025cee1ac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1460669a6569a4328c8be49025cee1ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1460669a6569a4328c8be49025cee1ac_JaffaCakes118.exe
-
Size
388KB
-
MD5
1460669a6569a4328c8be49025cee1ac
-
SHA1
4b1d723bc917dee81f0cfc054c096b063938620a
-
SHA256
2c06bd8b0432a98589f20333d78a394816971fe772e1a790c13cf89e1465509f
-
SHA512
a7570c5136538f5cc4b45bea323e6dae76504a7bcf7d9dd3630fe072bdf48bed791049ac22934cf0756dba1b6e037362b0235b4bcd082c13447f1284da74b675
-
SSDEEP
6144:GLiuv8j7ZuA5ErOOze1QXh0jfLwhkLX3fgZXVK7iRyM1KTlbfLWqqZy8JqMxLY:wi1x55UIEhlCXvkXVg8IBjLvl8NLY
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2864 whmlgxa.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\whmlgxa.exe 1460669a6569a4328c8be49025cee1ac_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\jddgeih.dll whmlgxa.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1460669a6569a4328c8be49025cee1ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whmlgxa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 532 wrote to memory of 2864 532 taskeng.exe 32 PID 532 wrote to memory of 2864 532 taskeng.exe 32 PID 532 wrote to memory of 2864 532 taskeng.exe 32 PID 532 wrote to memory of 2864 532 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1460669a6569a4328c8be49025cee1ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1460669a6569a4328c8be49025cee1ac_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2984
-
C:\Windows\system32\taskeng.exetaskeng.exe {1073ED92-1166-4939-9EA9-D821ABD833DC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\PROGRA~3\Mozilla\whmlgxa.exeC:\PROGRA~3\Mozilla\whmlgxa.exe -yvexadc2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5ec0eee2ef7dddc78399cfc941dd7459a
SHA1a65dccfe53330402eb28c9b2be7953622bbb8652
SHA2565126f8530c2c7a5b2295724226798dddf86504063f453acf130f045b5573e6fe
SHA51289b3abcd033d54438ab759cf6bc1c2420d2c58baa1481b7227055517bbd163ff8c4535f7ebcbd4ae9d465ff10c998a08bcdc18f234c3a366dd9348f262ea240b