Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
406250fbaa2c18d3330586c480aa3620_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
406250fbaa2c18d3330586c480aa3620_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
406250fbaa2c18d3330586c480aa3620_JaffaCakes118.exe
-
Size
151KB
-
MD5
406250fbaa2c18d3330586c480aa3620
-
SHA1
6fee985aa435ebb425ea71bf1f61b8c0ce4cd310
-
SHA256
1c71cea25df52f6e804c7ddb23d85ba5ae2a1edee8d039f062df8af9f499bf20
-
SHA512
b6d189032c1cc05ffb0b4ed828448268bb673d206a73074c73707892cfc376fcf99ede8919d9ecc5c19690890700c5dc9335cb6e00d871c78f7bf8f1a013cc50
-
SSDEEP
3072:HAwEvRRdqcqpaiVPfGHO4xATzlypxd7CQn3piYtW0Cmz:TcRWcslXWRpjCS5TW0Cmz
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 1320 unidtrd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\unidtrd.exe 406250fbaa2c18d3330586c480aa3620_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\soforsm.dll unidtrd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 406250fbaa2c18d3330586c480aa3620_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unidtrd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1320 2352 taskeng.exe 31 PID 2352 wrote to memory of 1320 2352 taskeng.exe 31 PID 2352 wrote to memory of 1320 2352 taskeng.exe 31 PID 2352 wrote to memory of 1320 2352 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\406250fbaa2c18d3330586c480aa3620_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\406250fbaa2c18d3330586c480aa3620_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2368
-
C:\Windows\system32\taskeng.exetaskeng.exe {2E2398D9-075E-4B9B-8080-D6731A78140C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\PROGRA~3\Mozilla\unidtrd.exeC:\PROGRA~3\Mozilla\unidtrd.exe -esjphrh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD54008d811e9f47780926a6706064b3580
SHA1686ce910f3c26b24505b5f814d705929ec9bbbd0
SHA256aca1547c2d4cf8c7ec95a1656af2ab01959e0797876bb3e9f55131f687323e2c
SHA512a2e4fdccf3598ef246a999fae0071ccf6f005c7e51750ea3487e1710c340d243046f4623f5d6fe90f865560bdb6d4133b865cabd821b79b6b37b8a8868996941