Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe
-
Size
309KB
-
MD5
4067d27e2faeb1b220649ad94a10b951
-
SHA1
29046d76be655bb3bc48ffb932e6464de791cbe4
-
SHA256
92832b4cbc41d230d4d21d9bd35e4a256645b3f1a8d97a4c53aca298f8621c3e
-
SHA512
4f6ab2f294c2b0ac655f29f95dd67ad9a306fe8b2c78b235fd8131d1e67dd3089487b0ed3cae4ca3770af801aff9416a1c91210e31b8a23ac970c1a6150d14d4
-
SSDEEP
6144:Q7d3wVyBHl40pPwMHLdL1hALe+2NirdrQdZOwUKD0O:QJ3myL4wwMdoLT2NKcAwf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2084 atmi.exe -
Loads dropped DLL 1 IoCs
pid Process 2432 4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D9E5F948-3C80-AD4F-E7F9-6BD2C10548CF} = "C:\\Users\\Admin\\AppData\\Roaming\\Vaura\\atmi.exe" atmi.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atmi.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe 2084 atmi.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2084 2432 4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2084 2432 4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2084 2432 4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2084 2432 4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe 31 PID 2084 wrote to memory of 1112 2084 atmi.exe 19 PID 2084 wrote to memory of 1112 2084 atmi.exe 19 PID 2084 wrote to memory of 1112 2084 atmi.exe 19 PID 2084 wrote to memory of 1112 2084 atmi.exe 19 PID 2084 wrote to memory of 1112 2084 atmi.exe 19 PID 2084 wrote to memory of 1180 2084 atmi.exe 20 PID 2084 wrote to memory of 1180 2084 atmi.exe 20 PID 2084 wrote to memory of 1180 2084 atmi.exe 20 PID 2084 wrote to memory of 1180 2084 atmi.exe 20 PID 2084 wrote to memory of 1180 2084 atmi.exe 20 PID 2084 wrote to memory of 1236 2084 atmi.exe 21 PID 2084 wrote to memory of 1236 2084 atmi.exe 21 PID 2084 wrote to memory of 1236 2084 atmi.exe 21 PID 2084 wrote to memory of 1236 2084 atmi.exe 21 PID 2084 wrote to memory of 1236 2084 atmi.exe 21 PID 2084 wrote to memory of 1060 2084 atmi.exe 23 PID 2084 wrote to memory of 1060 2084 atmi.exe 23 PID 2084 wrote to memory of 1060 2084 atmi.exe 23 PID 2084 wrote to memory of 1060 2084 atmi.exe 23 PID 2084 wrote to memory of 1060 2084 atmi.exe 23 PID 2084 wrote to memory of 2432 2084 atmi.exe 29 PID 2084 wrote to memory of 2432 2084 atmi.exe 29 PID 2084 wrote to memory of 2432 2084 atmi.exe 29 PID 2084 wrote to memory of 2432 2084 atmi.exe 29 PID 2084 wrote to memory of 2432 2084 atmi.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4067d27e2faeb1b220649ad94a10b951_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Roaming\Vaura\atmi.exe"C:\Users\Admin\AppData\Roaming\Vaura\atmi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD59f42f3e7d96f73e6639d4d0382ad35d5
SHA1f07f9d3fcc9e697cbc6765e81e7730bdd58b4c72
SHA256b7bf8d06168b526e795d19a414e0ceca403b1d0d7c103f7a256d221dca63b8a1
SHA512e81ad7eb37dc8e70d4357f646ab6a150acf1f666ed2664f31db7453276f106fc15a760aba20dec0158f19ba666abd6130879c00dc0a13106889c2f87c545a26c