Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe
-
Size
227KB
-
MD5
295c1a86ad0ec5f6a722a45db211b90c
-
SHA1
07c170dd827a1166f49e5c86e9d879e51c946aae
-
SHA256
df5400c1323bd20d4a837affb2190566e3b9786ae1c7dad67659e58f6c04e38e
-
SHA512
959863a53c02a12f62e2b50776c2ce6f0032c9a60fb523535d1baa80fd6fce77c1640fa78d41f247fcd35cb4ec34ede929e5aed6f2ca658dc158cc1e55f32f37
-
SSDEEP
6144:S4DR0TJT/32p+VCQ6/Zgx8MHuBlk39JCbWb43irfM:BYJT/hCQ6/aavlOAirfM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2936 tasklist32.exe 2572 tasklist32.exe -
Loads dropped DLL 4 IoCs
pid Process 2416 295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe 2416 295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe 2936 tasklist32.exe 2936 tasklist32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\tasklist32.exe 295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\tasklist32.exe 295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2416 295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe 2936 tasklist32.exe 2572 tasklist32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2936 2416 295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2936 2416 295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2936 2416 295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2936 2416 295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2572 2936 tasklist32.exe 29 PID 2936 wrote to memory of 2572 2936 tasklist32.exe 29 PID 2936 wrote to memory of 2572 2936 tasklist32.exe 29 PID 2936 wrote to memory of 2572 2936 tasklist32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\295c1a86ad0ec5f6a722a45db211b90c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\windows\SysWOW64\tasklist32.exec:\windows\system32\tasklist32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\windows\SysWOW64\tasklist32.exec:\windows\system32\tasklist32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5295c1a86ad0ec5f6a722a45db211b90c
SHA107c170dd827a1166f49e5c86e9d879e51c946aae
SHA256df5400c1323bd20d4a837affb2190566e3b9786ae1c7dad67659e58f6c04e38e
SHA512959863a53c02a12f62e2b50776c2ce6f0032c9a60fb523535d1baa80fd6fce77c1640fa78d41f247fcd35cb4ec34ede929e5aed6f2ca658dc158cc1e55f32f37