Analysis
-
max time kernel
130s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe
-
Size
368KB
-
MD5
b4ead846143a753e728c6c44aa0fb869
-
SHA1
f2897f18aabf0c06458d026084c244574a985627
-
SHA256
ee44b973a72aac98fabeb5e08fd7f4cd88bec821c7fc2a5b707ba109e6ed0608
-
SHA512
43811539cce583c8cbd116d843a1552c9986f167aba1d0122b1264e81430bf42a8216dfb5ada4b6d166def55cb6bd47d9ccbdbd970c248591f371fbad5f7e659
-
SSDEEP
6144:ZHbFuENWJcGng1+QtRTozukLk50nsqt9u2CkMSGswoHab5bXJ0/+z3ri+4Y:Z7FuO2g9TozukwynsW99MfjbbRea
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3896 Tmywya.exe 51128 Tmywya.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Tmywya.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe File created C:\Windows\Tmywya.exe b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe File opened for modification C:\Windows\Tmywya.exe b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Tmywya.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Tmywya.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Tmywya.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 50476 3896 WerFault.exe 82 190864 51128 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tmywya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tmywya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main Tmywya.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main Tmywya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe 3896 Tmywya.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3896 Tmywya.exe 51128 Tmywya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1840 wrote to memory of 3896 1840 b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe 82 PID 1840 wrote to memory of 3896 1840 b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe 82 PID 1840 wrote to memory of 3896 1840 b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4ead846143a753e728c6c44aa0fb869_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\Tmywya.exeC:\Windows\Tmywya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 8243⤵
- Program crash
PID:50476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3896 -ip 38961⤵PID:50424
-
C:\Windows\Tmywya.exeC:\Windows\Tmywya.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
PID:51128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 51128 -s 6362⤵
- Program crash
PID:190864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 51128 -ip 511281⤵PID:191188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390B
MD5b00c0ccfaf8482b1787cf1c3d5bccb87
SHA1dd059dd0d06a729b04f8a99de67f243821534c24
SHA256d205dd7c08a3ed9daf0cdf5082c2d872181f6d254736e44a8ec7b906549f8fe9
SHA51207ee3de28ed8c5e77e27b24f85889152ab26bbb95df0e650e73b459b56366739d9f4ef637ad6167a6b9dc3b8c61cc4a7141882440a332a1f9205aa91f5de48ee
-
Filesize
264B
MD5b5302c4b58077878bce28698c02c4c7b
SHA13d60c4ade72c0124f70a2e4c9803d05affb24110
SHA256bfd9db2a06ad55598e219c7cde69d9547e7ea0ebc875f439e5d7cfa6847d4f98
SHA512a8842ec7a1fb33460e3d011bd80f8fe9dc9ce38892bccf45284c08f91111ec0179fa81e05cebc6e242d016a96003baea045f2ee15f97d5659226e9a5bf6c7c5f
-
Filesize
368KB
MD5b4ead846143a753e728c6c44aa0fb869
SHA1f2897f18aabf0c06458d026084c244574a985627
SHA256ee44b973a72aac98fabeb5e08fd7f4cd88bec821c7fc2a5b707ba109e6ed0608
SHA51243811539cce583c8cbd116d843a1552c9986f167aba1d0122b1264e81430bf42a8216dfb5ada4b6d166def55cb6bd47d9ccbdbd970c248591f371fbad5f7e659