Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 17:55
Behavioral task
behavioral1
Sample
848e1d0685603814c562268580869e0e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
848e1d0685603814c562268580869e0e_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
848e1d0685603814c562268580869e0e
-
SHA1
4a7209a1046003743772b0328e1293f7ae2676df
-
SHA256
b8ce0b0743c73f5f68fa37246803712d4369553d1c3dcf969ae443d1180f2a92
-
SHA512
34921e245d1893addf2437804328c7b16465612adcefeeed1fb61fa0dacb4a66c383f0067fc7ffd74bed55d004f37d5a070298f1c228a97e42c0a3505c7978d4
-
SSDEEP
24576:/u9wLrslihzjNLkFC+sYoulAi5YQDfW6QYUJlnXIJYDfiiX3WO:2acAvkFCBY1+LvuUrXHThX3f
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
848e1d0685603814c562268580869e0e_JaffaCakes118.exepid process 2940 848e1d0685603814c562268580869e0e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
848e1d0685603814c562268580869e0e_JaffaCakes118.exepid process 2940 848e1d0685603814c562268580869e0e_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
Processes:
848e1d0685603814c562268580869e0e_JaffaCakes118.exepid process 2384 848e1d0685603814c562268580869e0e_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2384-5-0x0000000000400000-0x00000000008EF000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\848e1d0685603814c562268580869e0e_JaffaCakes118.exe upx behavioral1/memory/2940-15-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
848e1d0685603814c562268580869e0e_JaffaCakes118.exe848e1d0685603814c562268580869e0e_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848e1d0685603814c562268580869e0e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848e1d0685603814c562268580869e0e_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
848e1d0685603814c562268580869e0e_JaffaCakes118.exepid process 2384 848e1d0685603814c562268580869e0e_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
848e1d0685603814c562268580869e0e_JaffaCakes118.exe848e1d0685603814c562268580869e0e_JaffaCakes118.exepid process 2384 848e1d0685603814c562268580869e0e_JaffaCakes118.exe 2940 848e1d0685603814c562268580869e0e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
848e1d0685603814c562268580869e0e_JaffaCakes118.exedescription pid process target process PID 2384 wrote to memory of 2940 2384 848e1d0685603814c562268580869e0e_JaffaCakes118.exe 848e1d0685603814c562268580869e0e_JaffaCakes118.exe PID 2384 wrote to memory of 2940 2384 848e1d0685603814c562268580869e0e_JaffaCakes118.exe 848e1d0685603814c562268580869e0e_JaffaCakes118.exe PID 2384 wrote to memory of 2940 2384 848e1d0685603814c562268580869e0e_JaffaCakes118.exe 848e1d0685603814c562268580869e0e_JaffaCakes118.exe PID 2384 wrote to memory of 2940 2384 848e1d0685603814c562268580869e0e_JaffaCakes118.exe 848e1d0685603814c562268580869e0e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\848e1d0685603814c562268580869e0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\848e1d0685603814c562268580869e0e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\848e1d0685603814c562268580869e0e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\848e1d0685603814c562268580869e0e_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD532275e253e8cfe0a69cb5d1acb82a253
SHA1afa1118aff6c7c20bd4f70f667edd1dc77d539e0
SHA256b8a1e600b4adb82f7e8778b0b14f9282b245b6b17cba5d7a5e2a096b244d2161
SHA5129cac1173cf0e0ef5721f2122cfae66e1e49e78be70b7f9e35c1a54f419590bfef1a5be8cdbd48e3e462fc67008884a583f7489fae8ee6648af34d23f71211542