Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
44904b504bb03c245a0ded8558001825_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44904b504bb03c245a0ded8558001825_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
44904b504bb03c245a0ded8558001825_JaffaCakes118.exe
-
Size
14KB
-
MD5
44904b504bb03c245a0ded8558001825
-
SHA1
b6f58a653105190bbe6a5add16585310e4d6d91d
-
SHA256
c3e76855c7dea89cb8b78e75ff95a08e1bcf4f8413ee17ea80c1bbe6e53e5265
-
SHA512
be70291de4f955f376480e293ecbe0635a4067bc0e79e3d85f7150ef40a88ce00dc484a6a4b759bb78580aa0139fdfc807e25c8184f93ebe3b3d8d8cc2ce576d
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY/:hDXWipuE+K3/SSHgxM
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 320 DEMBB05.exe 2912 DEM1056.exe 2732 DEM6577.exe 2892 DEMBA69.exe 1680 DEMF5C.exe 2964 DEM6529.exe -
Loads dropped DLL 6 IoCs
pid Process 2384 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe 320 DEMBB05.exe 2912 DEM1056.exe 2732 DEM6577.exe 2892 DEMBA69.exe 1680 DEMF5C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMF5C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMBB05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM1056.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM6577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMBA69.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2384 wrote to memory of 320 2384 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe 32 PID 2384 wrote to memory of 320 2384 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe 32 PID 2384 wrote to memory of 320 2384 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe 32 PID 2384 wrote to memory of 320 2384 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe 32 PID 320 wrote to memory of 2912 320 DEMBB05.exe 34 PID 320 wrote to memory of 2912 320 DEMBB05.exe 34 PID 320 wrote to memory of 2912 320 DEMBB05.exe 34 PID 320 wrote to memory of 2912 320 DEMBB05.exe 34 PID 2912 wrote to memory of 2732 2912 DEM1056.exe 36 PID 2912 wrote to memory of 2732 2912 DEM1056.exe 36 PID 2912 wrote to memory of 2732 2912 DEM1056.exe 36 PID 2912 wrote to memory of 2732 2912 DEM1056.exe 36 PID 2732 wrote to memory of 2892 2732 DEM6577.exe 38 PID 2732 wrote to memory of 2892 2732 DEM6577.exe 38 PID 2732 wrote to memory of 2892 2732 DEM6577.exe 38 PID 2732 wrote to memory of 2892 2732 DEM6577.exe 38 PID 2892 wrote to memory of 1680 2892 DEMBA69.exe 40 PID 2892 wrote to memory of 1680 2892 DEMBA69.exe 40 PID 2892 wrote to memory of 1680 2892 DEMBA69.exe 40 PID 2892 wrote to memory of 1680 2892 DEMBA69.exe 40 PID 1680 wrote to memory of 2964 1680 DEMF5C.exe 42 PID 1680 wrote to memory of 2964 1680 DEMF5C.exe 42 PID 1680 wrote to memory of 2964 1680 DEMF5C.exe 42 PID 1680 wrote to memory of 2964 1680 DEMF5C.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\44904b504bb03c245a0ded8558001825_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44904b504bb03c245a0ded8558001825_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\DEMBB05.exe"C:\Users\Admin\AppData\Local\Temp\DEMBB05.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\DEM1056.exe"C:\Users\Admin\AppData\Local\Temp\DEM1056.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\DEM6577.exe"C:\Users\Admin\AppData\Local\Temp\DEM6577.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\DEMBA69.exe"C:\Users\Admin\AppData\Local\Temp\DEMBA69.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\DEMF5C.exe"C:\Users\Admin\AppData\Local\Temp\DEMF5C.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\DEM6529.exe"C:\Users\Admin\AppData\Local\Temp\DEM6529.exe"7⤵
- Executes dropped EXE
PID:2964
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5e0115f684415060d5fd2ed498eef6c20
SHA18f803ae366da60f52aa72e31cab05ecaade46843
SHA25690d630675a9e32fe87504592fe063f526fb4ca8830ed46b89d79ad2ab8a1ad0f
SHA512c6d4b71f3e1537f823bb7e1d23e5d96eec736cfcb067beb7136fb054383d591ccbd27deccdc5db363e2159372e3b131e33b89fc3cdb738e11bee95277102402c
-
Filesize
14KB
MD55e323e5a7cc54116bce14ac6b8465210
SHA175745e963c223def51c02a1580067a9e0071a0a2
SHA256e9b4d180054ed9e9857db2dd1e017e2c9b936c6567b14845bae586d8eb456d95
SHA5122654890e182ba435ce6e9023dcebcba28da2213faf6efeb0c11e5d3a093d2ee4116c3ff660dff1cfd8970fc90b3b0c2a005cd8ef02bc016632ac7e771bc6116b
-
Filesize
14KB
MD5e52160b08275c174e99debff9e1859ed
SHA1990a71eef7ac73e6768785059c7046d3b542fed6
SHA2564fd6c13ff0b389f4370f2dbeeaa926fe5af7a41ee77a0010a626e0d32d59046f
SHA5128d177d951526eb04a5147380dec8d67669eb4bc026fe3af88b6071c0a44034a9dcbd570b019f3071a617aacd4c2d9cb470d31ea1f0391f8ae088bbcc3f629163
-
Filesize
14KB
MD5997dd8a501cdb68aa6ad0e8c53f91562
SHA1594559e0550c4befe50cc9eac6cb81fed8cbc6f2
SHA2568213c67ee1e855aeedc7ba2b886110eed817a8cd230ffa833f474a08b1d8b96f
SHA512de245aee01c96a23b846fac50d2ce0a6d8d540bd8bc91d5f3c79670bd16dd6192a8435c64ad2aa475c74e7b0f90f665d22340a05a65f811d86e1061bcdf8b599
-
Filesize
14KB
MD542b0d8e8597404959706501cc8be7af2
SHA17974c6a66cf6090bf2c28935bfa84401b502fd8d
SHA256b87fd1fd9cf5cf6a3f8fa49d102e741b0bf48cbab002b92d089e8ceb9f14d431
SHA512a12dd10b5929ba3b8ea2c8eec260e4b81c6f4c5bd8c5595f1223b8f2494ff815157fe969f11e060aded5986133de8343e5604e4b2963c11027120b54410d8eb2
-
Filesize
14KB
MD5d26972a6cbc040c53b5d22898678688e
SHA120771af65bbb88db4cc253233ab97c238bdeb099
SHA25690c84047b5ecf501e4d3ffa52f2b5929d80c1dc7068237a5c8b62dabb98d3b92
SHA51257f46bacc1bba239b4d198ab6dc8f6a44ebea6b37a1d84baaaa236e64278b999a8506c6316e343f56fc55c7af33558484c656408236fab81935c2e3c29f55316