Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 18:57
Behavioral task
behavioral1
Sample
4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe
-
Size
134KB
-
MD5
4187795eada3a6da47a0bedf55aa9d7b
-
SHA1
1af688b016b767cc4c953861a1383fb7a4b8f75a
-
SHA256
a4cbe211b6ee73ac1ce67361e9dc182389fcfd2c71c86e959c963223f39b2f1b
-
SHA512
838197919aa7b8b5336f0c629dbfa5ffd36442f1c6d0ef34d3fefd6afe4d57a593053479340314eb8627b19d8709608d3d9d57b9d7f587139defc1b88bfaa552
-
SSDEEP
3072:o8xkhFdDM7NE4UZBHDRk5dHpK1H7c5GPbYotcb:chDANEzLdk5dJ8sSYk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2152 Lvofaa.exe -
resource yara_rule behavioral1/memory/2452-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x000900000001747d-8.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe File created C:\Windows\Lvofaa.exe 4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe File opened for modification C:\Windows\Lvofaa.exe 4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Lvofaa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Lvofaa.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lvofaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main Lvofaa.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International Lvofaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe 2152 Lvofaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2152 2452 4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2152 2452 4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2152 2452 4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2152 2452 4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4187795eada3a6da47a0bedf55aa9d7b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\Lvofaa.exeC:\Windows\Lvofaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD54187795eada3a6da47a0bedf55aa9d7b
SHA11af688b016b767cc4c953861a1383fb7a4b8f75a
SHA256a4cbe211b6ee73ac1ce67361e9dc182389fcfd2c71c86e959c963223f39b2f1b
SHA512838197919aa7b8b5336f0c629dbfa5ffd36442f1c6d0ef34d3fefd6afe4d57a593053479340314eb8627b19d8709608d3d9d57b9d7f587139defc1b88bfaa552
-
Filesize
372B
MD544c64ef3e3027c4214bcee74635d2540
SHA141deea0f3761e7506c7d07e2dad57ebb08b7a79a
SHA25604ec934725821bdbdae4c030dcb4275935742e18391c705a0ea690017ad64767
SHA512551dd398f4b745f905a505f518a0960b22e7c31e6936aab2cf5ca7b189aeb68fae63d94cb58f8697933b95509b367d683673220d5b42c1dc52a5c7ed7c344e67