Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe
-
Size
221KB
-
MD5
277d1af47dbaee6ad1c90867f6ffacb2
-
SHA1
2d1b8bf98761788d0ee62eb703fa5b5cc597060d
-
SHA256
e135fe83776a56ed2c189c0c0f0679c709a0042f175600d3326e10da118348df
-
SHA512
40b0641800d4a0f5c65b0fd86422665685adb00987bcca84327afe8abb28a24d24c7ec03193af0c66e1723bf19d0cef169cd1dfca1d80a5fadb86740f845f159
-
SSDEEP
3072:gSCvHByjhL/dLCMK8v730mXm0RWTQ2LyhtBxf1XW786Ofq1cU5xYmP03NSw98W:fjhLlLHYd0RWTQ2LyzYg6i8PYWW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1528 Hfijia.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe File created C:\Windows\Hfijia.exe 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe File opened for modification C:\Windows\Hfijia.exe 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Hfijia.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Hfijia.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hfijia.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main Hfijia.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International Hfijia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe 1528 Hfijia.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1528 1712 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe 28 PID 1712 wrote to memory of 1528 1712 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe 28 PID 1712 wrote to memory of 1528 1712 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe 28 PID 1712 wrote to memory of 1528 1712 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe 28 PID 1712 wrote to memory of 1528 1712 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe 28 PID 1712 wrote to memory of 1528 1712 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe 28 PID 1712 wrote to memory of 1528 1712 277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\277d1af47dbaee6ad1c90867f6ffacb2_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\Hfijia.exeC:\Windows\Hfijia.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD5277d1af47dbaee6ad1c90867f6ffacb2
SHA12d1b8bf98761788d0ee62eb703fa5b5cc597060d
SHA256e135fe83776a56ed2c189c0c0f0679c709a0042f175600d3326e10da118348df
SHA51240b0641800d4a0f5c65b0fd86422665685adb00987bcca84327afe8abb28a24d24c7ec03193af0c66e1723bf19d0cef169cd1dfca1d80a5fadb86740f845f159
-
Filesize
372B
MD5ab905025504823b5b187aee627e1bd05
SHA1c9e923f19c78b44252defaf766812b9eed2d9f82
SHA2560157bd53471dfb9f1e83b2674753b8dbfe3e370353277564b5b7c8e802c68610
SHA512f8a5418b9f7f636f4e0a2cb3cee4738397a1ee5674f0bec4cc101fedf81f074a7229e42cbf3ccc4d3a6db6a0532411dfea48e201e64a6b71e74e1f0a3546e47b