Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 09:25
Behavioral task
behavioral1
Sample
56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
56a8731eef36fab2eee0482653a66dce
-
SHA1
805ecebf1cbdacde13624ae0e4f1982ef5e92bcf
-
SHA256
498266b1a581bfa37b0d1f780a9ef90df4086c7c496dde5b76317138325893d3
-
SHA512
76f2efd66292153cc85c0eea16d2e80ca8a07fbb51ac2bd23d48d09e0b62861ba5c1d0414fc5b300873230ecdf3a588e9e76e73b68b238e7290bac40b3b71b48
-
SSDEEP
49152:Q6nZ1EAF1uIXFa7/rkGFXYifz7R2ySQZHtteay3:nnbaYw6ySs23
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2204-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral1/files/0x00080000000120fb-11.dat upx behavioral1/memory/2176-23-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe 2176 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2176 2204 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2176 2204 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2176 2204 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2176 2204 56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\56a8731eef36fab2eee0482653a66dce_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD582d9d3973bfb727ac4b34b706e271fdd
SHA1d6f94b79c9cee36dc965a486eb2408b913ccb135
SHA25693fc99cd7856a6ccbcb5640d0ec2f7bc17835647f147f853326ccd673d343c0d
SHA51284f5a6212e579653e0a431520062f7e16173aefa87e33893d50e20a56831b44c46da18974ec55f3f7056e97356e8f02ee321a6068039d2116c6b09b6f23a4bf6