Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:15
Behavioral task
behavioral1
Sample
b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe
-
Size
346KB
-
MD5
b4f0f5a249a19d9923f8447d643831ba
-
SHA1
437ccdbc2e25d6fc8871d21fc63aa39339855c49
-
SHA256
c0ea5e0293530f6ae8ee61c083d147cc69ca7c81e74ada7a8f2129c0bac43bbe
-
SHA512
ff8464e1f72a2f7f237f99fb02359c8db58d1991cb5fc49703488d241fe5382ffda20e84542ff8e06d52e159b5722536c980670e1efe1232e8168c3faf8d6fd8
-
SSDEEP
6144:puzYwKuEcWPawThMeOhMzm5UKaxxmYrNmIAUxRbLIehweJ369AFKaAIqXlIrbH7e:UzYwKuEYUhoMO+xxmYrkwDDV69XtXqXC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1272 0ccc7.exe 2596 0ccc7.exe -
Loads dropped DLL 2 IoCs
pid Process 588 b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe 1272 0ccc7.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/588-10-0x0000000000400000-0x00000000004BF000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1272 set thread context of 2596 1272 0ccc7.exe 32 -
resource yara_rule behavioral1/memory/588-0-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/588-10-0x0000000000400000-0x00000000004BF000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ccc7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ccc7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2596 0ccc7.exe 2596 0ccc7.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 588 wrote to memory of 1272 588 b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe 31 PID 588 wrote to memory of 1272 588 b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe 31 PID 588 wrote to memory of 1272 588 b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe 31 PID 588 wrote to memory of 1272 588 b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe 31 PID 1272 wrote to memory of 2596 1272 0ccc7.exe 32 PID 1272 wrote to memory of 2596 1272 0ccc7.exe 32 PID 1272 wrote to memory of 2596 1272 0ccc7.exe 32 PID 1272 wrote to memory of 2596 1272 0ccc7.exe 32 PID 1272 wrote to memory of 2596 1272 0ccc7.exe 32 PID 1272 wrote to memory of 2596 1272 0ccc7.exe 32 PID 2596 wrote to memory of 1212 2596 0ccc7.exe 21 PID 2596 wrote to memory of 1212 2596 0ccc7.exe 21 PID 2596 wrote to memory of 1212 2596 0ccc7.exe 21 PID 2596 wrote to memory of 1212 2596 0ccc7.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\0ccc7.exeC:\Users\Admin\AppData\Local\Temp/0ccc7.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\0ccc7.exe"C:\Users\Admin\AppData\Local\Temp\0ccc7.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2596
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD56e807723b980370753213ae00be39622
SHA14c8be5b8c97bf0cb708bfb97cee5552bece1a7e5
SHA25674f6050cebd78a4d6df4691db4fa2b08d3d3b84c31c7c6752cf4e1c6e9563f26
SHA512baed9e3c8edd217d8cce264f828d0c13d775df1cf21bbdcbc8003197da1d05ed11e90db65c0c98d2cc93d4fe8ec32647ed895682b1d95f7c0df6036019e7efea