Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
82712916212b0afb091628ef6e504807_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82712916212b0afb091628ef6e504807_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
82712916212b0afb091628ef6e504807_JaffaCakes118.exe
-
Size
659KB
-
MD5
82712916212b0afb091628ef6e504807
-
SHA1
7d3ca67ac52e82dc4b3b6cafa44ed5dba4524182
-
SHA256
b960eebf53fcd2e17332eebc70391b29cd31445fdcdf5ea134c57ebf7bef4fb0
-
SHA512
cde1013d9b4000c56b5ef748212abe25a66d94d5502145f65fb534d49665c09c37d343d96f3481b3d82d80cdc0d3ed8518da4c091c74b09c87a4c8754656726d
-
SSDEEP
6144:EhYsafa0idunTIPDan9xTy2VTk0xfdI3QPTYiEYKB6eTBh+:EWlfiunTIe9hTk0xlI30TYUHeT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4404 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\GSOPJr\svchost.exe 82712916212b0afb091628ef6e504807_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\GSOPJr\svchost.exe 82712916212b0afb091628ef6e504807_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\RkyFho.dll svchost.exe File created C:\Windows\OHOWna\flpDWgN.dll svchost.exe File opened for modification C:\Windows\OHOWna\flpDWgN.dll svchost.exe File created C:\Windows\lbEEeL.dll 82712916212b0afb091628ef6e504807_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4988 4404 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82712916212b0afb091628ef6e504807_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4404 svchost.exe 4404 svchost.exe 4404 svchost.exe 4404 svchost.exe 4404 svchost.exe 4404 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4404 4004 82712916212b0afb091628ef6e504807_JaffaCakes118.exe 84 PID 4004 wrote to memory of 4404 4004 82712916212b0afb091628ef6e504807_JaffaCakes118.exe 84 PID 4004 wrote to memory of 4404 4004 82712916212b0afb091628ef6e504807_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\82712916212b0afb091628ef6e504807_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82712916212b0afb091628ef6e504807_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files (x86)\GSOPJr\svchost.exe"C:\Program Files (x86)\GSOPJr\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 11843⤵
- Program crash
PID:4988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4404 -ip 44041⤵PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD55bc72eef34210830dc1f2a4696b5fac1
SHA129699a79f7bad31a8c1aa636458d180f88e236bf
SHA2569713b0f34e2a74438bf9357db73d490a24ef496eab45708d0e2359cddbe39f94
SHA512388ead3297ec8f279b88ab32db96b2e1624e114063f22bef1d0368a3007192b6ea11197cced3f3c6266f66fd2f3529836951d07d9b1393a94ab16c8b6cc95b73