Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe
-
Size
573KB
-
MD5
2be9e622c87e88f8b4ce6ea3d59bc2d1
-
SHA1
873f50430422983ba704c60ced8b9a2695a6aa21
-
SHA256
e788cf060e3eba4cd833c633ab9f083e1f9843aa447573ce6963065aeebb4c85
-
SHA512
91eb8d895fb725465338a9f2f634c12f528cbee69cd6ff2eea66acb14d8d4a5c617ad2360ba9fcc3cfe30f6f09428b005f28c9c523119e190a2cb2fffda68f90
-
SSDEEP
12288:xQzohboSTi5NwtEWhoUVC+AmecxWpPq0JSQZe:x6oe5NwtEiVC7JcxWpi0ng
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\Messages.exe 2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\Messages.exe 2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2756 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2264 2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe 2264 2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2756 2264 2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2756 2264 2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2756 2264 2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2756 2264 2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2be9e622c87e88f8b4ce6ea3d59bc2d1_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\84$$.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD526ab78729f63175c1c5f1992c8a47165
SHA1cfcdcee4f677de9087644ef4430256edfb5eb08f
SHA2564e907e7bc2a97ad082fa3aaa170c71239c2c9dce6228524a6809f90f9790591c
SHA512c79a085a2d2dc36f167f82c7485f29ced48be05cb77cd5fad5c93e71a2069b65d054a570a85ca357e294b1dbf525460eeccddbd4c0f13159bcc25023de6baf68
-
Filesize
569B
MD5d8593db39e6ab576dd9f4e8e62d79f65
SHA14acddf5ffdcbc2b3bdf1d4d202442ae36b681911
SHA25628a362d03cafd9c3f1fbc515e2ceaf3e23eb8416e6643a812c9badc7c427c5ac
SHA5128aabc5cf4c1c061d4a12a8df8a8e8de4270b1edb61b1a910ce99ff6ca01b85c4e543a5d3d7b6f21bd9b3ffb93591521719dc59e29ad28665c0dee046fd3ffae1