Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe
-
Size
190KB
-
MD5
40ae88a62c82c3c83e474d043c2080ee
-
SHA1
81b7d2407c96824e2ee5cc683e62caef76dd2437
-
SHA256
ef31a140496f2d1dfe981e10da8f42d40f10858e416c3b5a693c8f9e6eec6ad5
-
SHA512
9df4a024e33b1875d0f59fefe4c0fc6e99d6bb9e800c1117599927c7c4a3ba280e24b3512487f714ab8c09ed985c5fdc95564e37d7c4be511a74fbb7c41d76be
-
SSDEEP
3072:DUdB8d1ppSnDkMFVlc+iVc8RTzYJAp9WTE8f5iWWH9a+0fNpf7faP8S8a:DUv61oV1ccJNTDYH9R8pf7y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2832 Otatua.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Otatua.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe File created C:\Windows\Otatua.exe 40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe File opened for modification C:\Windows\Otatua.exe 40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Otatua.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Otatua.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International Otatua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe 2832 Otatua.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2180 40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe 2832 Otatua.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2832 2180 40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2832 2180 40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2832 2180 40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2832 2180 40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40ae88a62c82c3c83e474d043c2080ee_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\Otatua.exeC:\Windows\Otatua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190KB
MD540ae88a62c82c3c83e474d043c2080ee
SHA181b7d2407c96824e2ee5cc683e62caef76dd2437
SHA256ef31a140496f2d1dfe981e10da8f42d40f10858e416c3b5a693c8f9e6eec6ad5
SHA5129df4a024e33b1875d0f59fefe4c0fc6e99d6bb9e800c1117599927c7c4a3ba280e24b3512487f714ab8c09ed985c5fdc95564e37d7c4be511a74fbb7c41d76be
-
Filesize
372B
MD5eab5c738a7da0e3430c91a7a345d6a89
SHA16e3475c2fe6165803664a1d1e1c0fc1d37f3d174
SHA256982bc2197b418afd44d4b89ac3b4659934cd8ea282d730520427630d31604f68
SHA51224fa73a8eb0b61e9d1a477d2c200b8a78b60f2bde4a00f9df57a88959b14d35f99ca3a6f594722789c0791fb8e595c362a4aada3dc9229c025587f40ea346dda