Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe
-
Size
15KB
-
MD5
44062c3d33db1887856cbb53a17a2ae0
-
SHA1
dcc3bbba041cb642278592293e80b35e716e5fb9
-
SHA256
b6bb49bb3c1b9e017f052212cb3cf50c10dc029599c4bddc2f980aa4efc9b524
-
SHA512
64936ce323128ea6be50dd41350e75ba3cc16b8f17a0d653abfa2ef7d2f763141bfb0b4add2720949d67c8e12edcb80a22641e83b60247fab55bb997e1ba8d21
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYQMx+Lud:hDXWipuE+K3/SSHgxmHBd
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2916 DEM4412.exe 2688 DEM99B0.exe 1076 DEMEFAC.exe 2920 DEM45C7.exe 672 DEM9C7E.exe 2072 DEMF3B2.exe -
Loads dropped DLL 6 IoCs
pid Process 2496 44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe 2916 DEM4412.exe 2688 DEM99B0.exe 1076 DEMEFAC.exe 2920 DEM45C7.exe 672 DEM9C7E.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM9C7E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM4412.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM99B0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMEFAC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM45C7.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2916 2496 44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2916 2496 44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2916 2496 44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2916 2496 44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe 31 PID 2916 wrote to memory of 2688 2916 DEM4412.exe 33 PID 2916 wrote to memory of 2688 2916 DEM4412.exe 33 PID 2916 wrote to memory of 2688 2916 DEM4412.exe 33 PID 2916 wrote to memory of 2688 2916 DEM4412.exe 33 PID 2688 wrote to memory of 1076 2688 DEM99B0.exe 36 PID 2688 wrote to memory of 1076 2688 DEM99B0.exe 36 PID 2688 wrote to memory of 1076 2688 DEM99B0.exe 36 PID 2688 wrote to memory of 1076 2688 DEM99B0.exe 36 PID 1076 wrote to memory of 2920 1076 DEMEFAC.exe 38 PID 1076 wrote to memory of 2920 1076 DEMEFAC.exe 38 PID 1076 wrote to memory of 2920 1076 DEMEFAC.exe 38 PID 1076 wrote to memory of 2920 1076 DEMEFAC.exe 38 PID 2920 wrote to memory of 672 2920 DEM45C7.exe 40 PID 2920 wrote to memory of 672 2920 DEM45C7.exe 40 PID 2920 wrote to memory of 672 2920 DEM45C7.exe 40 PID 2920 wrote to memory of 672 2920 DEM45C7.exe 40 PID 672 wrote to memory of 2072 672 DEM9C7E.exe 42 PID 672 wrote to memory of 2072 672 DEM9C7E.exe 42 PID 672 wrote to memory of 2072 672 DEM9C7E.exe 42 PID 672 wrote to memory of 2072 672 DEM9C7E.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44062c3d33db1887856cbb53a17a2ae0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\DEM4412.exe"C:\Users\Admin\AppData\Local\Temp\DEM4412.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\DEM99B0.exe"C:\Users\Admin\AppData\Local\Temp\DEM99B0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\DEMEFAC.exe"C:\Users\Admin\AppData\Local\Temp\DEMEFAC.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\DEM45C7.exe"C:\Users\Admin\AppData\Local\Temp\DEM45C7.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\DEM9C7E.exe"C:\Users\Admin\AppData\Local\Temp\DEM9C7E.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\DEMF3B2.exe"C:\Users\Admin\AppData\Local\Temp\DEMF3B2.exe"7⤵
- Executes dropped EXE
PID:2072
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5ad35a0352c8c2c1a0d23fa3e2484d74b
SHA130801d479f368f3ed22b6f3ba5baf1fd36bad261
SHA2560c60a88b1e0e06124e687f8a795bc38917cd9d8b8f94dac7177f92ff62e44871
SHA51201bee43e754fd0bb83210b514959cf6674e79fce6ac4a53453cfbe42419b81f0110b289a62af24afd45216917d43d56b57dcc2052042f3ce6f287d742c9ce991
-
Filesize
15KB
MD5785ce2ba7b807028ff90625473ddb21d
SHA1ebf5db515673ecdc12b2ef906983f6a73b7e7931
SHA2564b5b4e82c687efc4f2a6b49f64a0b361d3bc4d8854f011a2d0c9fa1879c82104
SHA5121192c278f6d1e9e29bc5d8337213609bc96805461b4b3a5f64acce0ab08baaa1eaaa6694df85f26425582590adc1e5ab6f6df7ce670dd5ac63feb0534fad2a90
-
Filesize
15KB
MD553bd45aaf7c742fb8aa94b79a3d5295b
SHA1033427f2767e8e62f2bdff62df621a2bd4dff42e
SHA256468e0aa27a963e9b10d4a480f235f597e899ab9d3118ae280150f04da94422ec
SHA5127aa8827651211e9d879c3334bcb3b3afbf14aadf628bc33dcd9ad3160614f1982db9c582a57406e1fc4e735d11df3647e25726863d500062eb2391818ef3e933
-
Filesize
15KB
MD5ecbdadc6a7060693f1fa630aa3d46926
SHA18c418f69e7b5add44c9b615a2e2ea91dc8d7064a
SHA2564083ec635b1b4b5f609e733a7a0a60700fc6ff20f46d73ab0591dbb00867ff06
SHA51248d041a316cf9ef6ff353223e4d312cde6e34aa9f5c347adcf8e4574935966be3a6aa35429f601a047cb874aea50ab46ea02c8377da4b907bfbedb10c06c3a78
-
Filesize
15KB
MD5d27a7a8365d012e8b9933630e93fe7da
SHA11313bb538b2444a595225db042580415594de720
SHA2567febc1238ccfc439542b41a84ebcc3c1d921fdfedd43aed58780211f86b6a6c3
SHA51241e858d7a025236b40b735e7879664e54ea33bcc91dda6d852927de5fe382aff2904078133615eee25667da5ece43de95a64172c15b3a26128de408d3a2f54b4
-
Filesize
15KB
MD5ad9f0ac2b8faf68d5726dad526ed39ef
SHA1dc3a910ac1cc4a92aaef1737b3dd325334780a17
SHA2564740fddd652d20d9f43b10519c03539a7cdbdafe606a1c24317c8f7ee14f6346
SHA512b6e1bf78c13f60c7cd58b2419b393aee740ac73c11b7b09f5009d9ea20c9aea15ba1c26951994eb6a02c3d5fcd2ad3b414d8ed4857c0eef1eb69bde65cf5df5e