Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 07:10
Behavioral task
behavioral1
Sample
466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe
-
Size
21KB
-
MD5
466b3743232d6a68f54d370f8fa93673
-
SHA1
7bc151d797c652c6acbe74ff04658df6666df6d6
-
SHA256
e1ed2bf03841676c517f11e7cb310ef473f1ca39bc7f8a4690b3a2d3f64e4bd7
-
SHA512
7709c9bc7a2000d173644900983eda6c3f017a664c899878ab09e7bc2aa43b5f5206d83879a8613614c33b714d9064bb36f32949eaba2ff76cb6fd1e3b6aa992
-
SSDEEP
384:nshUHuAdwb492W08W8OY2CWNZ597y68iYf1HRjkzgQJd1Axzr6+S9Pfu7n5X:nmUHuzz8W8ByZj7y68vVRjkzgQKxKde5
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000b000000012280-2.dat aspack_v212_v242 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autostart.exe smss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autostart.exe smss.exe -
Executes dropped EXE 1 IoCs
pid Process 2776 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe 2192 466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\System\smss.exe 466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\System\smss.exe 466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe File created C:\Program Files\Common Files\System\start.bat smss.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REGEDIT.exe -
Runs regedit.exe 1 IoCs
pid Process 2708 REGEDIT.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2776 2192 466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2776 2192 466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2776 2192 466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2776 2192 466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2708 2776 smss.exe 31 PID 2776 wrote to memory of 2708 2776 smss.exe 31 PID 2776 wrote to memory of 2708 2776 smss.exe 31 PID 2776 wrote to memory of 2708 2776 smss.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\466b3743232d6a68f54d370f8fa93673_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files\Common Files\System\smss.exe"C:\Program Files\Common Files\System\smss.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\REGEDIT.exeREGEDIT /S "C:\Program Files\Common Files\System\start.bat"3⤵
- System Location Discovery: System Language Discovery
- Runs regedit.exe
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291B
MD5239692327ed96d1d23daf92e034275d0
SHA172368106cfe3dbfa6c7c09068df12b4840a8de23
SHA256b70c591470a52b92ded3a5fef8bc6cc2d0169573bb2aa53956024811c4116c3c
SHA512acd5fdc14f16ee7a3f025c742f1077ac1f3459fade751790a64f7bea995195c82be48334cd27ebae5e00a79d1d6a3dbdf468dfc95eba2149b4dbc317df558067
-
Filesize
21KB
MD5466b3743232d6a68f54d370f8fa93673
SHA17bc151d797c652c6acbe74ff04658df6666df6d6
SHA256e1ed2bf03841676c517f11e7cb310ef473f1ca39bc7f8a4690b3a2d3f64e4bd7
SHA5127709c9bc7a2000d173644900983eda6c3f017a664c899878ab09e7bc2aa43b5f5206d83879a8613614c33b714d9064bb36f32949eaba2ff76cb6fd1e3b6aa992