Analysis
-
max time kernel
38s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 07:24
Behavioral task
behavioral1
Sample
38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe
-
Size
5.1MB
-
MD5
38fc0d911fb59e294fb817a7c4143142
-
SHA1
bd36c4b26aec74590faa1e713c753e7e5802d772
-
SHA256
f8b1d45c1c7131293f74e09c7991612b2b11cbb6eef5034179feadf3c4d486c3
-
SHA512
31600241b3207626393bc8e1ee4643c24dacf50f897d09552f0377a6563464db8e06fa0e53131c1edca2873434b30f94b922f01a3ae3765db41e0f7dd5e1e42d
-
SSDEEP
49152:/0FXfThPa1Qbo0TdpmAcLzXpjUtQ7iiSR8vGhay35bkrfg8FYri+ts5EjdZwaA94:/G7USbDY4tjJai30g2yOEjjs9/g3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3068 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2412 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2412-7-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral1/files/0x000900000001227e-11.dat upx behavioral1/memory/3068-17-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2412 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2412 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe 3068 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3068 2412 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe 29 PID 2412 wrote to memory of 3068 2412 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe 29 PID 2412 wrote to memory of 3068 2412 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe 29 PID 2412 wrote to memory of 3068 2412 38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\38fc0d911fb59e294fb817a7c4143142_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD51abe5a10735ac2dbf2c8514610d71b6e
SHA12a02ab175fafde4b9c40fd05630183415404f548
SHA2569f24ffb6de64bf6d0a346e6e120690b93c5dbe3afc9d60305177cd12d1c12472
SHA51208fc0ae5f89806d7cd1d535595aed781ddceba43692d3429a4551a2e758d1e26a19ec9cf84442a799c71bd4f5c586ac5c32d8a10bbfc125a48065fba496dff8f