Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 11:17
Static task
static1
Behavioral task
behavioral1
Sample
17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe
-
Size
481KB
-
MD5
17dc6fd51e152105d529f347fcacf21e
-
SHA1
5b91d933af6a7b1a5fe0ef3ff829b1e0044b2ef8
-
SHA256
5d7bc178cb3eafae7b2c99b2cfd2ceec87119cf2403f86af87435d4479f36724
-
SHA512
4f35c90eddd617a328b3527b8dcecceab82621042f49fba7a2ea8d29174d80feb3f54dd2272c26fd64aeb57e0ec38bc1a7578197c0b9063a8ed133e7f6399724
-
SSDEEP
12288:viDHKIAVjf7g8BaP7Hc55+CghrP0P//PK:qLJAVXaHP3ry/6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2548 33A2E4F0.exe -
Loads dropped DLL 2 IoCs
pid Process 2540 17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe 2540 17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\{7C046CF8-759C-4301-A95C-2D5FD8AD23DE} = "C:\\ProgramData\\{1D7BD5EC-1EA9-44E8-9114-08DDFBD26AB9}\\33A2E4F0.exe" 17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{7C046CF8-759C-4301-A95C-2D5FD8AD23DE} = "C:\\ProgramData\\{1D7BD5EC-1EA9-44E8-9114-08DDFBD26AB9}\\33A2E4F0.exe" 17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2548 2540 17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2548 2540 17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2548 2540 17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2548 2540 17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17dc6fd51e152105d529f347fcacf21e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\ProgramData\{1D7BD5EC-1EA9-44E8-9114-08DDFBD26AB9}\33A2E4F0.exe"C:\ProgramData\{1D7BD5EC-1EA9-44E8-9114-08DDFBD26AB9}\33A2E4F0.exe"2⤵
- Executes dropped EXE
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD56ebfc091660afd97b66751997731ab3a
SHA191f087897567562b10f38c0360bdb87838aab603
SHA2566f654b418aed90ce9637f3dbe239457c62013b5250ef946b4a5112f343fb022e
SHA512f2f34608a31c51684fead741c8b0924cb04c8361891808fac263708799ac8ead365a3e964690383acfcfaefa827b73d4db87ee9205cd1503bd4691b86b12209e
-
Filesize
481KB
MD517dc6fd51e152105d529f347fcacf21e
SHA15b91d933af6a7b1a5fe0ef3ff829b1e0044b2ef8
SHA2565d7bc178cb3eafae7b2c99b2cfd2ceec87119cf2403f86af87435d4479f36724
SHA5124f35c90eddd617a328b3527b8dcecceab82621042f49fba7a2ea8d29174d80feb3f54dd2272c26fd64aeb57e0ec38bc1a7578197c0b9063a8ed133e7f6399724