Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.exe
-
Size
360KB
-
MD5
9f0f2b4a2fe38245dd321b8fb7e51308
-
SHA1
b2aacf71216a220862aa773e16a463d389e83353
-
SHA256
b0fe93dd9c1c8171aa67dfa21ca26124b9f1e893eff56d407a43b802d96b65b6
-
SHA512
cd307c80f695384f87db9b63d5c70642d729d49c0c6d8cf9852e6dc17b39b7a5b45e67c9be49a92a33b9daaad5ae3f83eb91535bc5adecce77af9c6f5e47f505
-
SSDEEP
6144:mzG8nriOnW/rGgGEh4/+mkROq9d05pgcVC7DJbxwH19qQCWX33lEb:e1DYri/QRB9dYt2D7M7qQCWVEb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
sil.exesil2.exepid Process 2768 sil.exe 2848 sil2.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid Process 2196 cmd.exe 2196 cmd.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2768-31-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/2848-36-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe -
Processes:
resource yara_rule behavioral1/files/0x000a000000016dd7-8.dat upx behavioral1/files/0x0007000000016dd1-26.dat upx behavioral1/memory/2196-28-0x00000000008B0000-0x000000000094C000-memory.dmp upx behavioral1/memory/2768-30-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2768-31-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2848-36-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.execmd.exesil.exesil2.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sil2.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
sil.exesil2.exepid Process 2768 sil.exe 2768 sil.exe 2768 sil.exe 2848 sil2.exe 2848 sil2.exe 2848 sil2.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
sil.exesil2.exepid Process 2768 sil.exe 2768 sil.exe 2768 sil.exe 2848 sil2.exe 2848 sil2.exe 2848 sil2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.execmd.exedescription pid Process procid_target PID 1872 wrote to memory of 2196 1872 9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2196 1872 9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2196 1872 9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2196 1872 9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2768 2196 cmd.exe 32 PID 2196 wrote to memory of 2768 2196 cmd.exe 32 PID 2196 wrote to memory of 2768 2196 cmd.exe 32 PID 2196 wrote to memory of 2768 2196 cmd.exe 32 PID 2196 wrote to memory of 2848 2196 cmd.exe 33 PID 2196 wrote to memory of 2848 2196 cmd.exe 33 PID 2196 wrote to memory of 2848 2196 cmd.exe 33 PID 2196 wrote to memory of 2848 2196 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f0f2b4a2fe38245dd321b8fb7e51308_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\del.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\sil.exesil.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\sil2.exesil2.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99B
MD556aa57faace3cdf419642dd857022dbc
SHA1ff5d04e1acc9a2e9c6e1aabcd914e9e2c61c3308
SHA256a384aa77f7ef0c283afd0f47757f28e6a1e1a913f72621f02cbb844f0df36b27
SHA5120bcba59d779e0263dee0ed5d35629b9bc0e470ef65920697d8deea757aab05c8c7149916341d0ee2c1de51baaf77b1247185e9b65f9c3b4edaa1e18126f9ae5b
-
Filesize
244KB
MD56850a8978718eb41f467139922c0caac
SHA139dbb1fb4576085f235a61c3bd470024540b3d3f
SHA256a31dc09c530748bd943daeac3b74e04ac030fdf2790e97dc1ad97325c8ecc2fa
SHA512b45958895d91d5851403602b48f88bafd87d0cc4a6831308f0a96eba1a15bdab3c54b928292d2d96e7ca236eb7f573c3dc4e07a0f559a11e806081ff26e3bc53
-
Filesize
244KB
MD51cfc30a5e0e262f1dbe5911ab322684e
SHA15a9f9571643bbc53b8d7bd3e57d0f88efa8ec457
SHA256010d64b0fd6f0be6dbfb766c59c9757c0216adc788bcd04a097954d16ed55c42
SHA5126d11c9ba8157db5c030c5faecac15596dbc420553e3e44659fbcfc169a620f33749a5568bf5f63c54dcdbba18aeac0b6809d54041f0dff7bdf73d4d6d062f30c