Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
464d0df40e812b559193270a015096de_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
464d0df40e812b559193270a015096de_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
464d0df40e812b559193270a015096de_JaffaCakes118.exe
-
Size
228KB
-
MD5
464d0df40e812b559193270a015096de
-
SHA1
c99b6aef26c3d2dbb757ae9f059ccfa94e60908a
-
SHA256
013d9902e74c6a2e2c9830361d00dca773bf28e5db7f22eb5618b02e2ffcb646
-
SHA512
f1dc26eda36d83fa633c0671695ae033438dd17e878321c0aedb0189bafcec9e297578ee24507937d5e97a8b268b1ef93ee86d9781d0ad3149da88f1003035d0
-
SSDEEP
6144:GclnqLykWN4Sl52tIbWeA+Slppx7wVANJmc:GAnqLybcIytPw
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\464d0df40e812b559193270a015096de_JaffaCakes118.exe 483325.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\464d0df40e812b559193270a015096de_JaffaCakes118.exe 483325.exe -
Executes dropped EXE 2 IoCs
pid Process 2776 RES.exe 3020 483325.exe -
Loads dropped DLL 4 IoCs
pid Process 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2068 set thread context of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 464d0df40e812b559193270a015096de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483325.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2776 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2760 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2760 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2760 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2760 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2660 2760 vbc.exe 33 PID 2760 wrote to memory of 2660 2760 vbc.exe 33 PID 2760 wrote to memory of 2660 2760 vbc.exe 33 PID 2760 wrote to memory of 2660 2760 vbc.exe 33 PID 2068 wrote to memory of 3020 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 34 PID 2068 wrote to memory of 3020 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 34 PID 2068 wrote to memory of 3020 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 34 PID 2068 wrote to memory of 3020 2068 464d0df40e812b559193270a015096de_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\464d0df40e812b559193270a015096de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\464d0df40e812b559193270a015096de_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\RES.exeC:\Users\Admin\AppData\Roaming\RES.exe2⤵
- Executes dropped EXE
PID:2776
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\57iupulk.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFFA4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFFA3.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
C:\Users\Admin\AppData\Roaming\483325.exe"C:\Users\Admin\AppData\Roaming\483325.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bfbce4f1734c909d1037faa601e4212e
SHA1dc75d273038a7c6758972e6ee7077bf732611c95
SHA256aecbae650c6b46e7371ff993671ecdc7f8fdc631e6a3a48f587e25c6c13b8ab9
SHA512d2e3e7b8804af480d14cc58c06fe31cbefa9f3c6fd466c19bdd21799de8e8da6727021e17e1108e970902f21533ed6a2c40e8ad7f0fea245323690f9b359dca9
-
Filesize
234B
MD5d54409c640ff2f8daf2f7be1af828be3
SHA1b86bb442a27caa780656800d92aa822d2f2b9ea8
SHA2562863592eb8f00adda931270f81c6901748226ac5ac3193834ad499a41cfacfe3
SHA5128590ac163db316a24f238c44a4bf07c8a9cf582d8c6181cda02ba584389cf7f2f2d212562f13c6cf8d4389e8ccb3d8bc47a656db7838b9f1721978b8281b365b
-
Filesize
1KB
MD58a83ac33e5a8a359dbf96fedb6d5afcc
SHA124fb349317f90b8ccc13204255e3826c9f8b9d26
SHA2560c1fbb2ed246d1675e3bf0ae7cb8a0ce1272bc957e2b2e2994eb1d508bbf2680
SHA5126f7007a95da71c8294bb7c03b17f13687a474f9b0092b2b88f9f04caa2dfb46dd25e7bf049e22c99958c922b221d575c81f2082a4131ceceaa43af6c24c753f2
-
Filesize
880B
MD5b946541871befcbe1cc53561b5f33772
SHA1c6b6b78a61d3c5fe43e647d3d303f77fa2a12bbd
SHA25662ae403ed860398cdea5215ce330ccff99ef17def9ba9dc93dfcc40d2bf191b5
SHA512864e4c94b98f0fa921656910cdc9b8e53b5317e0196b197effb68a19729d387af3b2a6fcd937b4296dc9ce0c0d2a95eb8ba87649e81a9fef7eb1ce11dba2b4b8
-
Filesize
7KB
MD5ed3f74f3fbaa0c03db722d0cea378cc1
SHA14e3764132d0e08456101a564480baad430680221
SHA2569c480c4f372f4ee8acead16b80f8e61a049691b1be6fa93d2fd16f1db9bdaa64
SHA5125533a7204d89603bbf4e0a1e05e92626b76daf1cc17d6bd81e07897488a87ad8bb95d3fb452bd0cf5aae584c8d77795755851df7d1f3c2dfe3b33dcf68a66198
-
Filesize
1KB
MD5f54b30f21b7b118bfeda2b1ed3482f84
SHA1bde084ea60646dadabfed4eafe5bafceb4c11b99
SHA25662bf121e7c7d3a221718d90de673ab23b9759765bb4aaed747883c7c7d08c2c5
SHA5128431f8c37b0fbc1077eb0aef78ad2e10c11bb10e16ddbde833f568cbd69551e23c85aadcce4ddc71994a9fede59eca52bc99d595131c2264e4e9917abe87e44d