Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
574f831525cc7a5d42ee8d9311563880_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
574f831525cc7a5d42ee8d9311563880_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
574f831525cc7a5d42ee8d9311563880_JaffaCakes118.exe
-
Size
329KB
-
MD5
574f831525cc7a5d42ee8d9311563880
-
SHA1
8dc051655edb4424f57602864ba7cf0ec77f735d
-
SHA256
a980fe4c2d9c05192b71fe29aee1d6421243a3c48105628f1d37611668a5c930
-
SHA512
3d91ed376d34da7e4109e1700ca4d46fc522cb4471e596073af9d5aecfd0803fa042fb321ac42c4e99b1f5b8f4ee928dd3caf24661a74ff6250dc1b4927740ab
-
SSDEEP
6144:siMF/X479SEAanPSIv0FB5iSbGqJQjdSHN:sI79SE1lMFmS+dYN
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2424 cpfmqte.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\cpfmqte.exe 574f831525cc7a5d42ee8d9311563880_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\zbgopeh.dll cpfmqte.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 574f831525cc7a5d42ee8d9311563880_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cpfmqte.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 236 574f831525cc7a5d42ee8d9311563880_JaffaCakes118.exe 2424 cpfmqte.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2424 1864 taskeng.exe 31 PID 1864 wrote to memory of 2424 1864 taskeng.exe 31 PID 1864 wrote to memory of 2424 1864 taskeng.exe 31 PID 1864 wrote to memory of 2424 1864 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\574f831525cc7a5d42ee8d9311563880_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\574f831525cc7a5d42ee8d9311563880_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:236
-
C:\Windows\system32\taskeng.exetaskeng.exe {08AFF907-A95A-4D7C-BA83-0463CE9D1A46} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\PROGRA~3\Mozilla\cpfmqte.exeC:\PROGRA~3\Mozilla\cpfmqte.exe -lecvesj2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD563246804b796c93876c8eff1d62b8bad
SHA1b0cb7f98b52e964127c87161802a1beadb4564e8
SHA25614f4accf32627d8d7b1df69388fd9975ca2b885c171588253f1f2db4cef20e82
SHA5120328a729a3449a282b863c6a3deacb37eb910103924c4f97205524765025886b6baca5db1226d4aabf78433cb90800b4864604d22ff52ed75e4fc95497c56597