Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
3f66b440f038b44d85d4d896941147a1
-
SHA1
e91d3c5586cdd2748c3c5145e5bad6ce492f2bdd
-
SHA256
b8753a95e3563b0e24609922e9df8760da447aebd537f25b1b8a997acb2e1fb9
-
SHA512
19ddb2dbb3b2cdfe27bd73390ffbb44ff4230bdb2ab91f25413d1a05976d4dd1055c1d7d6c8c00a04f7014517e46064b7d307fa562dbe1040a98dcdb47ce5db5
-
SSDEEP
24576:P8XkFFBb5f/GfLyl0kYU0+cZkkUgLkjwmCJS8gxGm1Apxeiz5lY7C:k0Fb9GC07l4gIjwmTKpxei7Y7C
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2024 msiinst.exe -
Loads dropped DLL 5 IoCs
pid Process 2328 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe 2328 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe 2024 msiinst.exe 2024 msiinst.exe 2024 msiinst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiinst.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2024 2328 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2024 2328 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2024 2328 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2024 2328 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2024 2328 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2024 2328 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2024 2328 3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f66b440f038b44d85d4d896941147a1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msiinst.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msiinst.exe /i instmsi.msi /qb+2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD517ce5d0e4f6edbcda037fe67207fb9e3
SHA140604842c47729e14c5cdff23b6a99d17a04b8d3
SHA2562d9943c89732b19581ad495b24097f07314aca99f1634f1ed02bd7f1c29bf674
SHA5120ad251a764037ab4def4bcfd8980d161534d5733f6fa04d22c84e254a3d8c6ed9e0f62d4775364568b31b9d8b97b4ccc48d6589acc4cd2a41a3259dbc43ad78d