Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe
-
Size
80KB
-
MD5
2eef518a3540b3bb740ac445a041314d
-
SHA1
e5f7bc325580248c33b195b72e4eb7e296b20243
-
SHA256
dec4d52f48e330ff6864601f9ae9403c5e86c31320d39036c8b2c80cbc3d7e96
-
SHA512
c9616793f5fb5c6f0467ba091131366d528e6c5e6afc9df1c67c4eb91cd6f1739d8e322a5649517777e7ba1cea0113b702bad4651969bb10419ac5f7e5c2ea9b
-
SSDEEP
1536:HaLHXe7V81xg89e7C+MIsGxYcFtJibuaQXadJ6g8Pv7Elj:Hu3eG/qC+MvnuaQXYJALElj
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2528 realply.exe 2332 realply.exe 2676 realply.exe 1696 realply.exe 2004 realply.exe 2172 realply.exe -
Loads dropped DLL 12 IoCs
pid Process 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 2528 realply.exe 2528 realply.exe 2332 realply.exe 2332 realply.exe 2676 realply.exe 2676 realply.exe 1696 realply.exe 1696 realply.exe 2004 realply.exe 2004 realply.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\realply.exe 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\realply.exe 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe File created C:\Windows\SysWOW64\realply.exe realply.exe File created C:\Windows\SysWOW64\realply.exe realply.exe File created C:\Windows\SysWOW64\realply.exe realply.exe File created C:\Windows\SysWOW64\realply.exe realply.exe File created C:\Windows\SysWOW64\realply.exe realply.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language realply.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language realply.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language realply.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language realply.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language realply.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 2528 realply.exe 2528 realply.exe 2528 realply.exe 2528 realply.exe 2528 realply.exe 2528 realply.exe 2332 realply.exe 2332 realply.exe 2332 realply.exe 2332 realply.exe 2332 realply.exe 2332 realply.exe 2332 realply.exe 2332 realply.exe 2332 realply.exe 2332 realply.exe 2332 realply.exe 2332 realply.exe 2676 realply.exe 2676 realply.exe 2676 realply.exe 2676 realply.exe 2676 realply.exe 2676 realply.exe 2676 realply.exe 2676 realply.exe 2676 realply.exe 2676 realply.exe 2676 realply.exe 2676 realply.exe 1696 realply.exe 1696 realply.exe 1696 realply.exe 1696 realply.exe 1696 realply.exe 1696 realply.exe 2004 realply.exe 2004 realply.exe 2004 realply.exe 2004 realply.exe 2004 realply.exe 2004 realply.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2528 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2528 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2528 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2528 2408 2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2332 2528 realply.exe 32 PID 2528 wrote to memory of 2332 2528 realply.exe 32 PID 2528 wrote to memory of 2332 2528 realply.exe 32 PID 2528 wrote to memory of 2332 2528 realply.exe 32 PID 2332 wrote to memory of 2676 2332 realply.exe 33 PID 2332 wrote to memory of 2676 2332 realply.exe 33 PID 2332 wrote to memory of 2676 2332 realply.exe 33 PID 2332 wrote to memory of 2676 2332 realply.exe 33 PID 2676 wrote to memory of 1696 2676 realply.exe 34 PID 2676 wrote to memory of 1696 2676 realply.exe 34 PID 2676 wrote to memory of 1696 2676 realply.exe 34 PID 2676 wrote to memory of 1696 2676 realply.exe 34 PID 1696 wrote to memory of 2004 1696 realply.exe 35 PID 1696 wrote to memory of 2004 1696 realply.exe 35 PID 1696 wrote to memory of 2004 1696 realply.exe 35 PID 1696 wrote to memory of 2004 1696 realply.exe 35 PID 2004 wrote to memory of 2172 2004 realply.exe 36 PID 2004 wrote to memory of 2172 2004 realply.exe 36 PID 2004 wrote to memory of 2172 2004 realply.exe 36 PID 2004 wrote to memory of 2172 2004 realply.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\realply.exeC:\Windows\system32\realply.exe -bai C:\Users\Admin\AppData\Local\Temp\2eef518a3540b3bb740ac445a041314d_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\realply.exeC:\Windows\system32\realply.exe -bai C:\Windows\SysWOW64\realply.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\realply.exeC:\Windows\system32\realply.exe -bai C:\Windows\SysWOW64\realply.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\realply.exeC:\Windows\system32\realply.exe -bai C:\Windows\SysWOW64\realply.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\realply.exeC:\Windows\system32\realply.exe -bai C:\Windows\SysWOW64\realply.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\realply.exeC:\Windows\system32\realply.exe -bai C:\Windows\SysWOW64\realply.exe7⤵
- Executes dropped EXE
PID:2172
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD52eef518a3540b3bb740ac445a041314d
SHA1e5f7bc325580248c33b195b72e4eb7e296b20243
SHA256dec4d52f48e330ff6864601f9ae9403c5e86c31320d39036c8b2c80cbc3d7e96
SHA512c9616793f5fb5c6f0467ba091131366d528e6c5e6afc9df1c67c4eb91cd6f1739d8e322a5649517777e7ba1cea0113b702bad4651969bb10419ac5f7e5c2ea9b