Analysis
-
max time kernel
93s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:15
Behavioral task
behavioral1
Sample
b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe
-
Size
346KB
-
MD5
b4f0f5a249a19d9923f8447d643831ba
-
SHA1
437ccdbc2e25d6fc8871d21fc63aa39339855c49
-
SHA256
c0ea5e0293530f6ae8ee61c083d147cc69ca7c81e74ada7a8f2129c0bac43bbe
-
SHA512
ff8464e1f72a2f7f237f99fb02359c8db58d1991cb5fc49703488d241fe5382ffda20e84542ff8e06d52e159b5722536c980670e1efe1232e8168c3faf8d6fd8
-
SSDEEP
6144:puzYwKuEcWPawThMeOhMzm5UKaxxmYrNmIAUxRbLIehweJ369AFKaAIqXlIrbH7e:UzYwKuEYUhoMO+xxmYrkwDDV69XtXqXC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4912 0ccc7.exe 2768 0ccc7.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1240-10-0x0000000000400000-0x00000000004BF000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4912 set thread context of 2768 4912 0ccc7.exe 85 -
resource yara_rule behavioral2/memory/1240-0-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral2/memory/1240-10-0x0000000000400000-0x00000000004BF000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ccc7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ccc7.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2768 0ccc7.exe 2768 0ccc7.exe 2768 0ccc7.exe 2768 0ccc7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1240 wrote to memory of 4912 1240 b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe 84 PID 1240 wrote to memory of 4912 1240 b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe 84 PID 1240 wrote to memory of 4912 1240 b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe 84 PID 4912 wrote to memory of 2768 4912 0ccc7.exe 85 PID 4912 wrote to memory of 2768 4912 0ccc7.exe 85 PID 4912 wrote to memory of 2768 4912 0ccc7.exe 85 PID 4912 wrote to memory of 2768 4912 0ccc7.exe 85 PID 4912 wrote to memory of 2768 4912 0ccc7.exe 85 PID 2768 wrote to memory of 3444 2768 0ccc7.exe 56 PID 2768 wrote to memory of 3444 2768 0ccc7.exe 56 PID 2768 wrote to memory of 3444 2768 0ccc7.exe 56 PID 2768 wrote to memory of 3444 2768 0ccc7.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\0ccc7.exeC:\Users\Admin\AppData\Local\Temp/0ccc7.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\0ccc7.exe"C:\Users\Admin\AppData\Local\Temp\0ccc7.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD56e807723b980370753213ae00be39622
SHA14c8be5b8c97bf0cb708bfb97cee5552bece1a7e5
SHA25674f6050cebd78a4d6df4691db4fa2b08d3d3b84c31c7c6752cf4e1c6e9563f26
SHA512baed9e3c8edd217d8cce264f828d0c13d775df1cf21bbdcbc8003197da1d05ed11e90db65c0c98d2cc93d4fe8ec32647ed895682b1d95f7c0df6036019e7efea