Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 04:26
Static task
static1
Behavioral task
behavioral1
Sample
2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe
-
Size
142KB
-
MD5
2acad191ecf88d53d76d3d68425b0256
-
SHA1
a69a0282ea3e9ffa668545bdfb4541985c19946a
-
SHA256
ee981d6e307421f3fcc6ce3d561887cb0b726cc4e666a2aa5142f3344f1e95e7
-
SHA512
2efca378fc258432df5c7fad1dd561b3640367fa9f9ec3d9b210611f2facb7d4693b665b9e6309abcd8c17c01fd48928cda04268be4f3a9a435671b460dcfe84
-
SSDEEP
3072:esvicRSw3P89L9qnikDQhOjaIoWgI1pCWU6rYaehI:Dvsk8XjBIjaIoWg6U6ca4I
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2732 sex.exe 2856 sex.exe 3024 sex.exe 2620 sex.exe 1548 sex.exe 380 sex.exe 2932 sex.exe 2196 sex.exe 1856 sex.exe 1340 sex.exe -
Loads dropped DLL 40 IoCs
pid Process 2996 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe 2996 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe 856 Process not Found 856 Process not Found 2732 sex.exe 2732 sex.exe 856 Process not Found 856 Process not Found 2856 sex.exe 2856 sex.exe 856 Process not Found 856 Process not Found 3024 sex.exe 3024 sex.exe 856 Process not Found 856 Process not Found 2620 sex.exe 2620 sex.exe 856 Process not Found 856 Process not Found 1548 sex.exe 1548 sex.exe 856 Process not Found 856 Process not Found 380 sex.exe 380 sex.exe 856 Process not Found 856 Process not Found 2932 sex.exe 2932 sex.exe 856 Process not Found 856 Process not Found 2196 sex.exe 2196 sex.exe 856 Process not Found 856 Process not Found 1856 sex.exe 1856 sex.exe 856 Process not Found 856 Process not Found -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\sex.exe 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2732 2996 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2732 2996 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2732 2996 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2732 2996 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2856 2732 sex.exe 31 PID 2732 wrote to memory of 2856 2732 sex.exe 31 PID 2732 wrote to memory of 2856 2732 sex.exe 31 PID 2732 wrote to memory of 2856 2732 sex.exe 31 PID 2856 wrote to memory of 3024 2856 sex.exe 32 PID 2856 wrote to memory of 3024 2856 sex.exe 32 PID 2856 wrote to memory of 3024 2856 sex.exe 32 PID 2856 wrote to memory of 3024 2856 sex.exe 32 PID 3024 wrote to memory of 2620 3024 sex.exe 33 PID 3024 wrote to memory of 2620 3024 sex.exe 33 PID 3024 wrote to memory of 2620 3024 sex.exe 33 PID 3024 wrote to memory of 2620 3024 sex.exe 33 PID 2620 wrote to memory of 1548 2620 sex.exe 34 PID 2620 wrote to memory of 1548 2620 sex.exe 34 PID 2620 wrote to memory of 1548 2620 sex.exe 34 PID 2620 wrote to memory of 1548 2620 sex.exe 34 PID 1548 wrote to memory of 380 1548 sex.exe 36 PID 1548 wrote to memory of 380 1548 sex.exe 36 PID 1548 wrote to memory of 380 1548 sex.exe 36 PID 1548 wrote to memory of 380 1548 sex.exe 36 PID 380 wrote to memory of 2932 380 sex.exe 37 PID 380 wrote to memory of 2932 380 sex.exe 37 PID 380 wrote to memory of 2932 380 sex.exe 37 PID 380 wrote to memory of 2932 380 sex.exe 37 PID 2932 wrote to memory of 2196 2932 sex.exe 38 PID 2932 wrote to memory of 2196 2932 sex.exe 38 PID 2932 wrote to memory of 2196 2932 sex.exe 38 PID 2932 wrote to memory of 2196 2932 sex.exe 38 PID 2196 wrote to memory of 1856 2196 sex.exe 39 PID 2196 wrote to memory of 1856 2196 sex.exe 39 PID 2196 wrote to memory of 1856 2196 sex.exe 39 PID 2196 wrote to memory of 1856 2196 sex.exe 39 PID 1856 wrote to memory of 1340 1856 sex.exe 40 PID 1856 wrote to memory of 1340 1856 sex.exe 40 PID 1856 wrote to memory of 1340 1856 sex.exe 40 PID 1856 wrote to memory of 1340 1856 sex.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 476 "C:\Users\Admin\AppData\Local\Temp\2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 528 "C:\Windows\SysWOW64\sex.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 532 "C:\Windows\SysWOW64\sex.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 544 "C:\Windows\SysWOW64\sex.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 536 "C:\Windows\SysWOW64\sex.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 540 "C:\Windows\SysWOW64\sex.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 548 "C:\Windows\SysWOW64\sex.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 556 "C:\Windows\SysWOW64\sex.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 552 "C:\Windows\SysWOW64\sex.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 564 "C:\Windows\SysWOW64\sex.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1340
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD52acad191ecf88d53d76d3d68425b0256
SHA1a69a0282ea3e9ffa668545bdfb4541985c19946a
SHA256ee981d6e307421f3fcc6ce3d561887cb0b726cc4e666a2aa5142f3344f1e95e7
SHA5122efca378fc258432df5c7fad1dd561b3640367fa9f9ec3d9b210611f2facb7d4693b665b9e6309abcd8c17c01fd48928cda04268be4f3a9a435671b460dcfe84