Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe
-
Size
497KB
-
MD5
1771ba439a826e9f2951e799d35ba475
-
SHA1
17eb29c98916d2a341ea027e6eaac44ddd1b0252
-
SHA256
24916486a5a5cc57b5a6b9e9958e8c22b1be3bb94e369b2678258d96aecb8ba4
-
SHA512
03e5771c6f1844a513f69b663c32c58de1916f6a7128fab8a985b6f68024d414b0c4f15b7979471a541bc7495318fe3e2db6baec638d9e44eae612e86a8b434f
-
SSDEEP
6144:lZuuObR8sVImcyYm/gUIJSSXZhdcTvMDPvvouX/gM93IgGVFBkQcn9XhptwSkt/C:aV+mzFIJnZhdcT0jTwBk79n+SIEkBXxu
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3000 C.exe 2704 MDBoxClient Ver 1.exe 2616 C.exe -
Loads dropped DLL 6 IoCs
pid Process 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\__tmp_rar_sfx_access_check_259453343 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\MDBoxClient Ver 1.exe 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\__tmp_rar_sfx_access_check_259460504 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\C.exe 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\C.exe 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\MDBoxClient Ver 1.exe 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDBoxClient Ver 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3000 C.exe 3000 C.exe 2616 C.exe 2616 C.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3000 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 30 PID 2672 wrote to memory of 3000 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 30 PID 2672 wrote to memory of 3000 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 30 PID 2672 wrote to memory of 3000 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2704 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 31 PID 2672 wrote to memory of 2704 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 31 PID 2672 wrote to memory of 2704 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 31 PID 2672 wrote to memory of 2704 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 31 PID 2672 wrote to memory of 2616 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 32 PID 2672 wrote to memory of 2616 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 32 PID 2672 wrote to memory of 2616 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 32 PID 2672 wrote to memory of 2616 2672 1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe 32 PID 3000 wrote to memory of 1256 3000 C.exe 21 PID 2616 wrote to memory of 1256 2616 C.exe 21 PID 3000 wrote to memory of 1256 3000 C.exe 21 PID 2616 wrote to memory of 1256 2616 C.exe 21 PID 3000 wrote to memory of 1256 3000 C.exe 21 PID 2616 wrote to memory of 1256 2616 C.exe 21 PID 3000 wrote to memory of 1256 3000 C.exe 21 PID 2616 wrote to memory of 1256 2616 C.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1771ba439a826e9f2951e799d35ba475_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\WINDOWS\SysWOW64\C.exe"C:\WINDOWS\system32\C.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000
-
-
C:\WINDOWS\SysWOW64\MDBoxClient Ver 1.exe"C:\WINDOWS\system32\MDBoxClient Ver 1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\WINDOWS\SysWOW64\C.exe"C:\WINDOWS\system32\C.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5325293e253556f77f367ab96ca8f3201
SHA19ed1a53cf191676d275a03e3bf91ae80af34b139
SHA256c5b650f7afff3f5803cbac8f9fe6fecc75855e1af81221b9530d846cda699757
SHA5126a13e18fb6fd86552f4095795a84a256ec7100364e54492aa1289241384c11a54ca8b27a0820d537978cf260e4ec2cbf9de27685a2f32faaa0f279013223bc55
-
Filesize
29KB
MD5aebd7c2aa4722c0d9e3105b4e984e6f7
SHA1b493c8f9ed7edf561588cceac43b2f216b284640
SHA25689cb20ec55687ecef61ca0fe8323ff55c655de7d3dfd8b3db35de0e9d733d65e
SHA5128c1d7567768944fd980e095b4c6819ebf04083e0e2796daf73ffdf35a96967fa70e125c3ba23f783c45d86902acf49b156018d47bacff92c78c31cbe86ded5dc