Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe
-
Size
266KB
-
MD5
3c6291ecf5bfec497ae02de4a1ee1c2e
-
SHA1
ac5159fa58e3a55b8746a3556eb8369621cfa638
-
SHA256
f6ae0d76223b2dbff0a974c581e40213ce4fd23bafd1c466ea9dd569e418c0e2
-
SHA512
e896cfe34563d2b9b3d5cee93693e9eecea972e7ed0a2a4451239027e5d648731ea52949969ec104a240cbd8a7ce423926640f16b8df20008fa7477df93bcdaa
-
SSDEEP
6144:9R/exBKWaCZUZY1UW2uP/THuqWs+ddbYFZj6ESE6R/ev9:94b7vZUZY1UgWlddEFt6ESE64v9
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2696 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk 2776 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk 2652 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk.lnk -
Loads dropped DLL 7 IoCs
pid Process 2084 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe 2084 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe 2696 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk 2696 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk 2776 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk 2776 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk -
resource yara_rule behavioral1/files/0x000600000001875d-36.dat upx behavioral1/memory/2652-41-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2652-63-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk.lnk Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2084 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe 2084 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe 2696 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk 2696 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk 2776 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk 2776 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2696 2084 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2696 2084 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2696 2084 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2696 2084 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe 31 PID 2696 wrote to memory of 2776 2696 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk 32 PID 2696 wrote to memory of 2776 2696 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk 32 PID 2696 wrote to memory of 2776 2696 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk 32 PID 2696 wrote to memory of 2776 2696 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk 32 PID 2776 wrote to memory of 2668 2776 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk 33 PID 2776 wrote to memory of 2668 2776 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk 33 PID 2776 wrote to memory of 2668 2776 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk 33 PID 2776 wrote to memory of 2668 2776 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk 33 PID 2668 wrote to memory of 2652 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk 34 PID 2668 wrote to memory of 2652 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk 34 PID 2668 wrote to memory of 2652 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk 34 PID 2668 wrote to memory of 2652 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk 34 PID 2668 wrote to memory of 2652 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk 34 PID 2668 wrote to memory of 2652 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk 34 PID 2668 wrote to memory of 2652 2668 3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnkC:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnkC:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnkC:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk.lnkC:\Users\Admin\AppData\Local\Temp\3c6291ecf5bfec497ae02de4a1ee1c2e_JaffaCakes118.exe.lnk.lnk.lnk.lnk5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5f98b72d59a4f58f1fe62170841eb36e0
SHA1adf6bdb1d1f322606a070c562fe81c0c019b9d1d
SHA2562afb6060e9a06975c30b314f61acf83056c97160bc4c53fe841708099158d34d
SHA512da8143df5b4d36e3153cd4fd9e69ff081e75201cf30184f8bfb71aadf788563d72a3801125fee9fb31737de50b89bc74dc7333f423631e2b5151c26965ab3bc6
-
Filesize
80KB
MD5dde62e6ffb8d1ee6e0357a1d77ec031d
SHA1ac6701f7428739ea115ee82fac035cbf2c28a48e
SHA256eaf1d66d2b7baa3239f126c5f5f88214fe7e6f8aac5b829f83d8a7647373d034
SHA5127490eb996c222690bd94c50c8199ba799aaa091d15017c6a6f374ffe05fe4ebbcc56ca938202a2d8352b84e49722cc7e6f14c35a5cde15473267b84f43466d1f
-
Filesize
234KB
MD524d79ab0f88bb18ee9dfda0578fb5ace
SHA167c4814a95d6c58ad417ec4ec7a63184e9ab8647
SHA2562f652b4e2777c46b0491d021eab4dd922060606f9a1582ffe0a6b2ad3e88ade7
SHA5127a9f4648e5585570fbd91c8c6b73de83cc8d7a52dafc4fc8dbf6912dd210721412d5f1b29cc0d0b0648c8352c25e0d76ea2bc9f94b019b5cf6540269d5e4da1e
-
Filesize
202KB
MD5001bfe74e2098f95a4b1ed0df659bc7b
SHA1225702323f9b42da5df15763639d974fa9665a18
SHA2565dcef42edfff6e7af09534f4f2ba0a3741840a4651e9409d5617ac2042b9c4b4
SHA51238a67bad479da89fffdb1c1dc8bd5733bfa7d115e8e2443a023059788fc3823b8f85e30e763083b4da48ac089e1627a74af5e5483b1a57e6f8c6d63145b19247
-
Filesize
138KB
MD59dcfe0a3fe891fe62a332c6fc5c30d52
SHA151c61f25c0398f059d4cfbe0f5e1cbb4cc65ccc3
SHA256df26b332ec60554655ce20d3bb0bbd13c0492ca01fefcf20ff27b6c5c726302a
SHA512aafce9fcee709a40069cc143fa34ae3ade13c27747c0d737af80905621b34b058910744286dd9e056dcef4362fcc53b458b7df49da834a4e4b4e8c89bfc7b90b