Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 21:59
Behavioral task
behavioral1
Sample
53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe
-
Size
91KB
-
MD5
53f01d84fb732cfb079e77ae115f697f
-
SHA1
92af9eb2c5f92a32d772e00b6638370a0661f12e
-
SHA256
42b39ba8c4f4c3b71a7962e519bf3511c4697d49bc9fad322bc497da14256f2e
-
SHA512
1160d6ca2ee1333f05a70436a0fc4df4e2f9d56fba04f35f6f1041e2ef90c106b8af91ec8f38212d029a1af54f879d9c0e9a11685687ea8a2100216b2b7c57a3
-
SSDEEP
1536:YQTMChuyedoa425zOjRpS0Jt1DP5LqA2y+W0B7GBva49O5bfETDDyaTE:FMCh83425z6xT1LRqA1+31GB39OIE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2600 D.exe -
Loads dropped DLL 5 IoCs
pid Process 2792 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 2792 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 2600 D.exe 2600 D.exe 2600 D.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2792-0-0x0000000001000000-0x0000000001025000-memory.dmp upx behavioral1/memory/2792-22-0x00000000001F0000-0x0000000000215000-memory.dmp upx behavioral1/memory/2792-21-0x0000000001000000-0x0000000001025000-memory.dmp upx behavioral1/memory/2792-40-0x0000000001000000-0x0000000001025000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2600 D.exe 2600 D.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2600 2792 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2600 2792 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2600 2792 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2600 2792 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2600 2792 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2600 2792 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2600 2792 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 28 PID 2600 wrote to memory of 1176 2600 D.exe 21 PID 2600 wrote to memory of 1176 2600 D.exe 21 PID 2600 wrote to memory of 1176 2600 D.exe 21 PID 2600 wrote to memory of 1176 2600 D.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5f52ae6078b24eb3c0ea35740925e6e72
SHA195c369ec7d93463e3dc973b64f183b92442eb560
SHA25678c11eca319bfea0a94476996bab294301785ae1248a417aa4df8de3ef0c5e72
SHA512d67e79c215b27e93bac3440ff43bb2ecf810f70a5146615f65f74854e93c16cbbf51584044866c42615e07c4f541acf441cdc7463261f6a4f7d72a193dcb8452