Analysis
-
max time kernel
32s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 06:57
Behavioral task
behavioral1
Sample
6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe
-
Size
2.9MB
-
MD5
6964ed8c97d823a92e2386e981c6570d
-
SHA1
9733a2c07cb92613a86a1d6fa454fbb1c87eb8a0
-
SHA256
48f42071aa5d1054ce42b0f572766702d1758166384d2fa1842519d8fc6d567a
-
SHA512
5994ee5666c0d8e94b9c93f28e245c1b2961c87ed5985c09072da0200b897459e4d788c26e2660a42717dd2c9434b977f4c11403aeac928761c435bf625cec5f
-
SSDEEP
49152:0I/HvMAiga2kqXwGz+1wrbKGJ2ype7zzBmiAWjk4Gust1it7uZSX:R/Xid2jX7yQZiLJA2kBjt1M7vX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2252 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2252 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2908 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2908-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0009000000012119-10.dat upx behavioral1/memory/2252-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2908 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2908 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe 2252 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2252 2908 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2252 2908 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2252 2908 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2252 2908 6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\6964ed8c97d823a92e2386e981c6570d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD528f653832d4ec4a3c9d27393377785fe
SHA1f2f161d741c41e3d57d54daafb34029df85a2459
SHA25660fbc5db528bf2cb60eaad86d043c810f8e9fc4c845fbf064742bc2428e7ea4e
SHA5122d805e2c539ab80d095ac4c0ee737408c620c5362ff60b3c3aa900539852e4b973e1b0c90a66aeb5028a4f9f35075667d4a1be381e82ba7dffdbc2d48972d422