Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:02
Behavioral task
behavioral1
Sample
2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
2e5eedf6b183178ac17b4cffb96a1ad4
-
SHA1
af0afc4674690bbe399df5ed0ea0d741b1edf449
-
SHA256
b2346c24bc6245b1cc076dee6ee8fd6f0dc055d97b3660d859eb2f532318e240
-
SHA512
8104e4f55ebc9dd83530172273be674066bf4d22560cef2240fd0be26214d607a76a730107a2dc04b97cb8ee0f113b5793643e61f230cd474fb464aadbf108e8
-
SSDEEP
24576:FqshhgkVwIISYeTL1Q0jc3TP0ejf5eQCMnMvLHNX1sxuggvG:FfhgkebSYenfWMsm/hFI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2712 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2712-4-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000a000000012250-11.dat upx behavioral1/memory/2764-17-0x0000000000400000-0x000000000086A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2712 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2712 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe 2764 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2764 2712 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2764 2712 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2764 2712 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2764 2712 2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51a0f2751bf00c76dba5d800ce12440f6
SHA1f8642b086361c283d0c4401473bafa219147deba
SHA2562fa498f41f88b12232a33040942a9bd392d37777a99058b7a86a3cba227a5222
SHA51254a25c95426198e7b7114d364bf93a01ce05793b5a2462befb0ac578f912564391d8cba89bd49d14433286f4afd14f1abb2fe40d592bf584edad1ab2ab7a18d7