Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe
-
Size
228KB
-
MD5
3aa63e965c6ad051ba37e152fc2d0e0c
-
SHA1
7524f9e1de6f2f1716654477313ec81621e499ea
-
SHA256
a0a779d7df80129e88610f3b3966a2de852c6bd051c8d8ba45a0c61cd596bc5a
-
SHA512
fad2de5778d729c7c9ad2223172d5346127429e3494632825a1e18ddc5531c90faad32a7244cc3273762427adbf3394c1f0edc21f6451b79392665e85c8472a6
-
SSDEEP
6144:t5x1dG3SuVUf3wB0Xslof8UAzi3LX2u7yDcN+A:XxzTuVgABpUAzKX2UGM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2260 Mzaxia.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\W1WIWQ1NPG = "C:\\Windows\\Mzaxia.exe" Mzaxia.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Mzaxia.exe 3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe File opened for modification C:\Windows\Mzaxia.exe 3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mzaxia.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main Mzaxia.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International Mzaxia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe 2260 Mzaxia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2260 2380 3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2260 2380 3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2260 2380 3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2260 2380 3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3aa63e965c6ad051ba37e152fc2d0e0c_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Mzaxia.exeC:\Windows\Mzaxia.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD53aa63e965c6ad051ba37e152fc2d0e0c
SHA17524f9e1de6f2f1716654477313ec81621e499ea
SHA256a0a779d7df80129e88610f3b3966a2de852c6bd051c8d8ba45a0c61cd596bc5a
SHA512fad2de5778d729c7c9ad2223172d5346127429e3494632825a1e18ddc5531c90faad32a7244cc3273762427adbf3394c1f0edc21f6451b79392665e85c8472a6
-
Filesize
372B
MD52d323b5bb00f5b014e45b3053f03821a
SHA1a4ae04bb15e15698bf9d13584bff194fd59142ba
SHA256ffbfce3c1ce6c4d78a1ceaae90f33f5615b3e14e706d47f14fb371793fc19465
SHA512fb57769c91a7202d4babb1cc42b5f80b503f7ef9d97cc0e19e5a13faee35d623d9fcb88b04aecf2cf6367a598078db72d2c97ea0a3812a9e3d20561679d1659c