Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 12:32
Behavioral task
behavioral1
Sample
1818d509759888dd2360cacab1773c99_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1818d509759888dd2360cacab1773c99_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1818d509759888dd2360cacab1773c99_JaffaCakes118.exe
-
Size
15KB
-
MD5
1818d509759888dd2360cacab1773c99
-
SHA1
cac1fde8c2232646ac57e6e4dbd3e86c89c09335
-
SHA256
e0b52ce483e3b1f5e5bb372eba8ac930336605b756039a916108a70c83d20775
-
SHA512
c19dc0d0aeca7ab6f7140497eac38482351cddcd3adafbcebfedc36786ca5a32205e1d6ef5efdb7478bdf9791211fed6e12b92058c57e7ec1bb27c13f0b99e82
-
SSDEEP
384:zfXUTiYqZV42rLNwvOXCIDGSlFIL17e+Vge:7XUm3a2rLNW3ISS87e+VP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1364 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 ld09.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sysldtray = "c:\\windows\\ld09.exe" ld09.exe -
resource yara_rule behavioral1/memory/1448-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/files/0x0008000000016c8c-7.dat upx behavioral1/memory/1448-19-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2724-20-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2724-23-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\ld09.exe 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe File created \??\c:\windows\ld09.exe 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ld09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2724 1448 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2724 1448 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2724 1448 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2724 1448 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe 30 PID 1448 wrote to memory of 1364 1448 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe 31 PID 1448 wrote to memory of 1364 1448 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe 31 PID 1448 wrote to memory of 1364 1448 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe 31 PID 1448 wrote to memory of 1364 1448 1818d509759888dd2360cacab1773c99_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1818d509759888dd2360cacab1773c99_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1818d509759888dd2360cacab1773c99_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\windows\ld09.exec:\windows\ld09.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\nm8912.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51818d509759888dd2360cacab1773c99
SHA1cac1fde8c2232646ac57e6e4dbd3e86c89c09335
SHA256e0b52ce483e3b1f5e5bb372eba8ac930336605b756039a916108a70c83d20775
SHA512c19dc0d0aeca7ab6f7140497eac38482351cddcd3adafbcebfedc36786ca5a32205e1d6ef5efdb7478bdf9791211fed6e12b92058c57e7ec1bb27c13f0b99e82
-
Filesize
268B
MD5cd387e39c25870c3817a4d107c701cf0
SHA192dec6cd1566570f82823c9187f50ecf6d7948e3
SHA2564116e6f6d424e1447ea459a539442cc8e8fbf34deddaceb0b9f0fe8e9f6f9869
SHA5126915f2996ea983188dede4ad814611365ef26c58aa3c380f4a0fcfcb81e86ef2c71cbed83215bf83d280f65e234dc0c2d4969234e1ead7aebec7743197c3668e