Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe
-
Size
283KB
-
MD5
28c98bb77290c1de29a40fda044ed22a
-
SHA1
a9b9049647abac71d1d93f53752316c49f76ac97
-
SHA256
e7d45e60e5e0c63c12a2f0eef2611953b8c71f090a02480c4d75c88c0f5b3ff5
-
SHA512
d0d4a9a576fd938885f2fc76fdffcf89abd445a751b9da37b287e156a97562bfda148d8a60c9de00fe92e2ead474fa847b48cd61260a9b40238d3871be1bd227
-
SSDEEP
6144:orP5OX8W/rEzvMTFRgjuJsAMy2Xiy9M9uTG+Y0xNzXqpt+MyVFN:MOsWzwMTQbA3mgITGkNzXqpsZVv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2348 svu.exe 2320 2.1 XR.EXE -
Loads dropped DLL 10 IoCs
pid Process 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 2348 svu.exe 2348 svu.exe 2348 svu.exe 2320 2.1 XR.EXE 2320 2.1 XR.EXE 2320 2.1 XR.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.1 XR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svu.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2320 2.1 XR.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2348 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2348 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2348 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2348 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2348 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2348 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2348 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2320 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2320 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2320 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2320 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2320 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2320 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2320 2508 28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28c98bb77290c1de29a40fda044ed22a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\svu.exe"C:\Users\Admin\AppData\Local\Temp\svu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\2.1 XR.EXE"C:\Users\Admin\AppData\Local\Temp\2.1 XR.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD58c8aa71d267f878301cc73ab2651b4d8
SHA1a979ab2a614d69372839d0b971f68bb63ae6d706
SHA256aec12db691d35c6f0e8661e741368d4cb646172599a823b098c887267278dd8a
SHA51270e77faabd26a08bb3646a1a562c3826c0c634f74460e03db5a7bc78308360d194958dbe4034564c12e2aa4eb7f4a125c8dfd6cbf901e3df03473781a8497eea
-
Filesize
280KB
MD502a830a6e2884fe78ba07166da76c4f3
SHA10733cc571bdafcad7263fcada028a50c26a59b18
SHA2567ab56448f6d673ac1d11b26c679ad3902669fa2e6a3466fd5fcaea529d05a4e5
SHA512e05a2dcca84c0d3f2d1045f577f9b54a9f6ba6d34c5ead93108f016b44c8261504101ae9f54ac599bc9b5441f3f94ab8498f9b7066eeef70f6d20b259fdf47fe