Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe
-
Size
311KB
-
MD5
848b6f16268a4310dd00bf70baafbc4b
-
SHA1
9ede0b362fc7906a8373ca12145e5300c6fd35a0
-
SHA256
dc28cc690a11b1394a0a9f104c84da5787b5b25db0c5fd00eb87f83048372635
-
SHA512
27c7342c9d57f34ca564fa44ea1301eeffc3c19aff2eb19dba8f1146808c0f5e4eedf3becfcb4bee780021062e1372aa43708d783afa863303e0a7a3a3158a23
-
SSDEEP
6144:/PHzVTnDQkkOZQv/xWs/0fvD281W1gWRknOUmXC3gxoimLjK8:/PHzV7DzOvJWs/0fva8dHYRxoiSz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Server.exeServer.exepid process 2636 Server.exe 2060 Server.exe -
Loads dropped DLL 6 IoCs
Processes:
848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exeServer.exeWerFault.exepid process 2992 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe 2992 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe 2636 Server.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe -
Drops file in System32 directory 2 IoCs
Processes:
Server.exedescription ioc process File created C:\Windows\SysWOW64\_Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\_Server.exe Server.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exeServer.exeServer.exedescription pid process target process PID 2316 set thread context of 2992 2316 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe PID 2636 set thread context of 2060 2636 Server.exe Server.exe PID 2060 set thread context of 2836 2060 Server.exe calc.exe -
Processes:
resource yara_rule behavioral1/memory/2992-6-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2992-7-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2992-4-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2992-8-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2992-9-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2992-10-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2992-13-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2060-36-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2992-35-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2060-39-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2060-49-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2060-51-0x0000000000400000-0x00000000004C5000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
Processes:
848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2680 2060 WerFault.exe Server.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exeServer.exeServer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exeServer.exeServer.exedescription pid process target process PID 2316 wrote to memory of 2992 2316 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe PID 2316 wrote to memory of 2992 2316 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe PID 2316 wrote to memory of 2992 2316 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe PID 2316 wrote to memory of 2992 2316 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe PID 2316 wrote to memory of 2992 2316 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe PID 2316 wrote to memory of 2992 2316 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe PID 2992 wrote to memory of 2636 2992 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe Server.exe PID 2992 wrote to memory of 2636 2992 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe Server.exe PID 2992 wrote to memory of 2636 2992 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe Server.exe PID 2992 wrote to memory of 2636 2992 848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe Server.exe PID 2636 wrote to memory of 2060 2636 Server.exe Server.exe PID 2636 wrote to memory of 2060 2636 Server.exe Server.exe PID 2636 wrote to memory of 2060 2636 Server.exe Server.exe PID 2636 wrote to memory of 2060 2636 Server.exe Server.exe PID 2636 wrote to memory of 2060 2636 Server.exe Server.exe PID 2636 wrote to memory of 2060 2636 Server.exe Server.exe PID 2060 wrote to memory of 2836 2060 Server.exe calc.exe PID 2060 wrote to memory of 2836 2060 Server.exe calc.exe PID 2060 wrote to memory of 2836 2060 Server.exe calc.exe PID 2060 wrote to memory of 2836 2060 Server.exe calc.exe PID 2060 wrote to memory of 2836 2060 Server.exe calc.exe PID 2060 wrote to memory of 2836 2060 Server.exe calc.exe PID 2060 wrote to memory of 2680 2060 Server.exe WerFault.exe PID 2060 wrote to memory of 2680 2060 Server.exe WerFault.exe PID 2060 wrote to memory of 2680 2060 Server.exe WerFault.exe PID 2060 wrote to memory of 2680 2060 Server.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"5⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 2805⤵
- Loads dropped DLL
- Program crash
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
311KB
MD5848b6f16268a4310dd00bf70baafbc4b
SHA19ede0b362fc7906a8373ca12145e5300c6fd35a0
SHA256dc28cc690a11b1394a0a9f104c84da5787b5b25db0c5fd00eb87f83048372635
SHA51227c7342c9d57f34ca564fa44ea1301eeffc3c19aff2eb19dba8f1146808c0f5e4eedf3becfcb4bee780021062e1372aa43708d783afa863303e0a7a3a3158a23