Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
15d64568e70dc7f4f9df8e808687334b
-
SHA1
8461b45e752ac170814a2850634421f88eca2c08
-
SHA256
6e5068459ca3404b350a4fc007f381046eadfa5467c6fc9cf638c3bbc6d5d478
-
SHA512
ee328788df66969bdcd202680dcbcf13852e72ec5ac8e64b833c9673e563cfb5eaeddaebb159d1d3031a3a9f7931223d8169fee7843a0acafb2dc3217cc3fc46
-
SSDEEP
24576:c4lFONOsmmOX3kyl+aJh6sURdzCm6WOqWxNBTGTFpGn+1wv7+/P3Xyedirm:c6ONwzJh6ZxLyl22j+Xyedirm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1764 ¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe 2828 1.6.exe -
resource yara_rule behavioral1/memory/3024-3-0x00000000008D0000-0x00000000008DD000-memory.dmp upx behavioral1/files/0x000a000000012286-6.dat upx behavioral1/memory/1764-10-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1764-54-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2660 1764 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main 1.6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 1.6.exe 2828 1.6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1764 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1764 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1764 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1764 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1764 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1764 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1764 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2828 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2828 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2828 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2828 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2828 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2828 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2828 3024 15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe 32 PID 1764 wrote to memory of 2660 1764 ¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe 33 PID 1764 wrote to memory of 2660 1764 ¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe 33 PID 1764 wrote to memory of 2660 1764 ¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe 33 PID 1764 wrote to memory of 2660 1764 ¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe 33 PID 1764 wrote to memory of 2660 1764 ¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe 33 PID 1764 wrote to memory of 2660 1764 ¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe 33 PID 1764 wrote to memory of 2660 1764 ¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15d64568e70dc7f4f9df8e808687334b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe"C:\¿óȪˮDNF8ÔÂ18¸üÐÂÂí.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 2523⤵
- Program crash
PID:2660
-
-
-
C:\1.6.exe"C:\1.6.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5523529bd02686182b8bdf018b78291da
SHA108fd72fa9bb1d115e9714137a7cba2dae2b5c86e
SHA256f688fb7a0360f174f41404c596923b8f5219477abf64f00859b2b62bec87f8de
SHA512876fb50b91dcf0b8dc938e82fe1a69d7503fd71a33bd9a9c2da667c19b818ac3b34c382d5a1238067797e313e8f57d98cce03e633231f2473e25e83e729fa2ea
-
Filesize
15KB
MD55a8f12188d51164c2ac3e16dad187d43
SHA1acd8795c53de4a9f1f85657083bfbbcdaca31d36
SHA2563a9018febc4a1880d288e0ec6db60e836acc5733e29b5b9f59d89b2dffa784d7
SHA5125618a844b98d19d753d67f461b5015fe1a0bb83a2227e011dd0d32dbce8279a93a8ea7dbbec4352a591456839e665ecefc7996d3e6712ab5293042344783802b