Analysis
-
max time kernel
65s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe
-
Size
279KB
-
MD5
3b50835746fefe11419821b3fcda9de4
-
SHA1
0c135f0a773c84310eacab6951e319c178c6cf75
-
SHA256
cb455f26c5fa61924a5b68932d292132f345ef27a90a4e8127fbf2e04e4fa3f6
-
SHA512
2730fa59710566c363373a3ceae2e38ac87b446f1ff912e09e214e852c4499abe02441dee2914e9f5b1c76aba8cf468db4241afa44bc6ab4a8526eeba8c2b96c
-
SSDEEP
6144:KZuuObR8sVImcyYm5ENR4NAKSWiSQJeuuTN+s/3TcLobMSDWNn3j23LeDGS:ZV+mzWOSWiSQJnu//0obGnzoLeDGS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2928 setup2.exe 2848 setup1.exe -
Loads dropped DLL 12 IoCs
pid Process 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 2928 setup2.exe 2928 setup2.exe 2928 setup2.exe 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 2848 setup1.exe 2848 setup1.exe 2848 setup1.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe -
resource yara_rule behavioral1/files/0x000600000001960c-5.dat upx behavioral1/memory/2928-11-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/memory/2476-10-0x0000000002E40000-0x0000000002F51000-memory.dmp upx behavioral1/files/0x00090000000195c6-24.dat upx behavioral1/memory/2476-26-0x0000000002E50000-0x0000000002E9C000-memory.dmp upx behavioral1/memory/2928-22-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/memory/2848-41-0x0000000000400000-0x000000000044C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2676 2848 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2928 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2928 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2928 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2928 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2928 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2928 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2928 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 30 PID 2928 wrote to memory of 2876 2928 setup2.exe 31 PID 2928 wrote to memory of 2876 2928 setup2.exe 31 PID 2928 wrote to memory of 2876 2928 setup2.exe 31 PID 2928 wrote to memory of 2876 2928 setup2.exe 31 PID 2928 wrote to memory of 2876 2928 setup2.exe 31 PID 2928 wrote to memory of 2876 2928 setup2.exe 31 PID 2928 wrote to memory of 2876 2928 setup2.exe 31 PID 2476 wrote to memory of 2848 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 33 PID 2476 wrote to memory of 2848 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 33 PID 2476 wrote to memory of 2848 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 33 PID 2476 wrote to memory of 2848 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 33 PID 2476 wrote to memory of 2848 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 33 PID 2476 wrote to memory of 2848 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 33 PID 2476 wrote to memory of 2848 2476 3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe 33 PID 2848 wrote to memory of 2676 2848 setup1.exe 34 PID 2848 wrote to memory of 2676 2848 setup1.exe 34 PID 2848 wrote to memory of 2676 2848 setup1.exe 34 PID 2848 wrote to memory of 2676 2848 setup1.exe 34 PID 2848 wrote to memory of 2676 2848 setup1.exe 34 PID 2848 wrote to memory of 2676 2848 setup1.exe 34 PID 2848 wrote to memory of 2676 2848 setup1.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b50835746fefe11419821b3fcda9de4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\uninstf7765a6.bat" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup2.exe""3⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 2563⤵
- Loads dropped DLL
- Program crash
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59B
MD52988b921fbed03f9c93c5d538932bbe3
SHA14b791b3d59ae76ff091c2cf201b40f5d1b432a3f
SHA256a1769979622d3d25829be12474ad32ccfdfcac59785dac2fc10ae49c300e4ea3
SHA5122920c6e9851973371dc238da1ee3c63d41c7820637856ee92c67e9489c1790e3fad287d229440d124e60b978f6819d04b47c40de9034cbd9de422aaafc2b07f9
-
Filesize
128KB
MD52bbab5ecad0ed9a910d5fd7d0155bd3e
SHA1b68da51441eca422c850ef1e6c2dbac5cdcabea1
SHA2565e8caa5e29c6e54e00e72dfb502ed5a18fcafb9a644a54045696e5bd5cd149b6
SHA51239d3e8092eae79cc91336e4f8a33bc34f6745db0bf3ffd666349221f979bac9c78be7581f16dae2241822b5a1e2ac9ab38ed327ab095ac603fcb58b1fccabb50
-
Filesize
58KB
MD55ee4fb801d94a2a4636c760e1474a68f
SHA113d3db6ec1d4856ffe0722889c42d75d4031c47b
SHA25677a1e4ecd23c054cf91ebe828e294e71434a005ccbea3c465aac89e2dd69dabb
SHA5126e5ee88563c9f9f2dc39efdaae6bdc2b6f465e8e71dac6f38f78d32fa9bc80c17488104cca6fd37a40ec1504c03989abf90574c65de517631bf4f10b0fbdbd58