Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
575493dc829728a38e25f4313e64a872_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
575493dc829728a38e25f4313e64a872_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
575493dc829728a38e25f4313e64a872_JaffaCakes118.exe
-
Size
164KB
-
MD5
575493dc829728a38e25f4313e64a872
-
SHA1
7f0eff4591cc2bb0af3fd6bc3c836a3ca3f29d1e
-
SHA256
bbd666ad3277dcc75b72b39a66d79d9f53f1640607bb346e4bc20fb57bad5669
-
SHA512
f5ef6812819a979b8ff59e9ff9fe6569bb34630aa6274b293f2c6a32b0cff880edf8eae184df88686bbbd372024f1f8aede10418e7992526057d15ca940845a0
-
SSDEEP
3072:7kZdaKmzgbj88H0J65n/BCkQ4+55Kz+uvtrEZ18NCJFtO5gS25Jron:wWK8CMh4+5wzlrf+YQ4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2992 Installatore_moduli_CCB32.exe -
Loads dropped DLL 4 IoCs
pid Process 2980 575493dc829728a38e25f4313e64a872_JaffaCakes118.exe 2992 Installatore_moduli_CCB32.exe 2992 Installatore_moduli_CCB32.exe 2992 Installatore_moduli_CCB32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 575493dc829728a38e25f4313e64a872_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 575493dc829728a38e25f4313e64a872_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installatore_moduli_CCB32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2992 Installatore_moduli_CCB32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2992 2980 575493dc829728a38e25f4313e64a872_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2992 2980 575493dc829728a38e25f4313e64a872_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2992 2980 575493dc829728a38e25f4313e64a872_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2992 2980 575493dc829728a38e25f4313e64a872_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2992 2980 575493dc829728a38e25f4313e64a872_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2992 2980 575493dc829728a38e25f4313e64a872_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2992 2980 575493dc829728a38e25f4313e64a872_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\575493dc829728a38e25f4313e64a872_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\575493dc829728a38e25f4313e64a872_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Installatore_moduli_CCB32.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Installatore_moduli_CCB32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5fbc424bf6ea41dce443613d46a3f1308
SHA18c92b29edf09a088d508f3baa11d4471c0d88e64
SHA25667be1221672e2accabc449ba187d6529496eab1419a058abf5a85788c6558e73
SHA5121918c4a419f40ebdfbd35beb9b7177e583bb9a870f12a6e526d0ee88b83f03f7ea6d3e86dc18068247394b1e0a498a35e4f2bc8ecec115bc3fcbcd2b60599fd8