Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe
-
Size
79KB
-
MD5
3c991cb4c01a22e0163d854705273b9c
-
SHA1
665b6f4df48e92cb5cbdbbd3302767faf87a5496
-
SHA256
11c190bcaf5db1dfd34a19d133df75dca06328bc0712ceceb447596b43b67a82
-
SHA512
710e72a5b29c26b7c3ccb8469cf2b1e0a5b80dbcc626b4470206da336b66267b341d390ce2512e5aaf84e0cb3a9fe65cc32758a58b2ffad892fcc8f4cf6d4506
-
SSDEEP
1536:YQxqcQu01TZlgkcgZYdfVCydmtXOd4fLJj3jW:X/0zlgNgZY5VCpW4DJW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2568 1seE34D.exe 2852 1seE34D.exe -
Loads dropped DLL 8 IoCs
pid Process 1832 3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe 1832 3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe 2568 1seE34D.exe 2812 WerFault.exe 2812 WerFault.exe 2812 WerFault.exe 2812 WerFault.exe 2812 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 2852 2568 1seE34D.exe 33 -
resource yara_rule behavioral1/files/0x0008000000016c23-2.dat upx behavioral1/memory/2568-12-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2568-44-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2812 2852 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1seE34D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1seE34D.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2568 1seE34D.exe 2816 DllHost.exe 2816 DllHost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2568 1832 3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe 31 PID 1832 wrote to memory of 2568 1832 3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe 31 PID 1832 wrote to memory of 2568 1832 3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe 31 PID 1832 wrote to memory of 2568 1832 3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2852 2568 1seE34D.exe 33 PID 2568 wrote to memory of 2852 2568 1seE34D.exe 33 PID 2568 wrote to memory of 2852 2568 1seE34D.exe 33 PID 2568 wrote to memory of 2852 2568 1seE34D.exe 33 PID 2568 wrote to memory of 2852 2568 1seE34D.exe 33 PID 2568 wrote to memory of 2852 2568 1seE34D.exe 33 PID 2568 wrote to memory of 2852 2568 1seE34D.exe 33 PID 2568 wrote to memory of 2852 2568 1seE34D.exe 33 PID 2568 wrote to memory of 2852 2568 1seE34D.exe 33 PID 2568 wrote to memory of 2852 2568 1seE34D.exe 33 PID 2852 wrote to memory of 2812 2852 1seE34D.exe 34 PID 2852 wrote to memory of 2812 2852 1seE34D.exe 34 PID 2852 wrote to memory of 2812 2852 1seE34D.exe 34 PID 2852 wrote to memory of 2812 2852 1seE34D.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c991cb4c01a22e0163d854705273b9c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\1seE34D.exe"C:\Users\Admin\AppData\Local\Temp\1seE34D.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\1seE34D.exe"C:\Users\Admin\AppData\Local\Temp\1seE34D.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 964⤵
- Loads dropped DLL
- Program crash
PID:2812
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5629594a1edc6e8e0f5b32fb3da6f0873
SHA10f90c0341b88ae3cd1d589f83ef0277eef87dc52
SHA256db9d6a5078cf62bdfc439786a4ea212da34b16c4e6857f691515fa89f341071d
SHA512f868d88f3cd21b28a1ae76c1ae1b36ab6da8fe6e449f1fde4201e9aa63502faf8156e05054b9f48093e26549d587ba03b89901e20f3b0b53329034afeaa53c16
-
Filesize
59KB
MD5862632f20212e84cb29ba64d97e1af61
SHA1abdfb60173ffaa686aba6cc26a87a0e4eeb3f422
SHA256127ab173aafaa4aadfafb0017c28a9e62c4cf31c48c1e6e2d873c7c4e9fc0d6c
SHA512d97ebe3ce1988ac81ea4bf81cada9951c3a54b7b708c34e2d507a0d33a3e5032966563cf35c9657662deb52e30e4cb08d117bea27af0cada670ac205fdb04e9a