Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 04:24
Behavioral task
behavioral1
Sample
5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe
-
Size
602KB
-
MD5
5576c9203f30cf539dd6cd55ef1e566e
-
SHA1
75c11270030685e2af67a349bf685c8e5b1cb727
-
SHA256
3b9deac1498962c1da3b51c3dea5a686590aadb731a3a9199b3acbe5f2b2402f
-
SHA512
1acc4ca48d78c2d1c0e19342aa627ecc7e3cb196908bcada9bd0d93a2dde9421157d6b36fb909700533923084a7bb0e6546833250d98c4a99a14da95dea4f333
-
SSDEEP
12288:JdIPydX22jbAW59EjyfRMLpZHiSsrHx79TfXr5M88Mw8KiOFMzg39n/ZJ7:oPyplbz9P9SsrHx79Tfy88DxiOF4OLt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4924 5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118mgr.exe -
resource yara_rule behavioral2/memory/2496-0-0x0000000000400000-0x0000000000B64000-memory.dmp upx behavioral2/files/0x0008000000023ca4-4.dat upx behavioral2/memory/4924-6-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2496-9-0x0000000000400000-0x0000000000B64000-memory.dmp upx behavioral2/memory/2496-10-0x0000000000400000-0x0000000000B64000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1948 4924 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118mgr.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2496 5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe 2496 5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2496 5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe 2496 5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2496 wrote to memory of 4924 2496 5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe 84 PID 2496 wrote to memory of 4924 2496 5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe 84 PID 2496 wrote to memory of 4924 2496 5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118mgr.exeC:\Users\Admin\AppData\Local\Temp\5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118mgr.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 2643⤵
- Program crash
PID:1948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4924 -ip 49241⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD598a8ced05b34189b8b36760049b2ea36
SHA1a5271250fb91d891c7df0cae7812ed68907ae076
SHA256e50689964fa016ff34ad6517bb863e26e571f907635e719f1fe5e70a61763d95
SHA5128548b7dc08007fe55e2b7f9bf502c7271655edff52100bb8445a321f37137139c0cd54f7f85558a2f99b38dd574c8435371adc07f8c365bf8a8561c63fe6be45