Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
e961f43fff26c449b276529686bb8728_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e961f43fff26c449b276529686bb8728_JaffaCakes118.exe
-
Size
502KB
-
MD5
e961f43fff26c449b276529686bb8728
-
SHA1
49b6c50762cef408e7cc018b5ab0937381784e19
-
SHA256
5be0a0874ff2d036520c50977252b456541eccf3ee13461089d1313fedbf5e99
-
SHA512
7bd8df5ffa992e782c42c70f22984f4d3a0b741c699463dc7df2036c0e6a9d300d0211224ca53948fb0d93a53133ad4b610286f059c346c9cb5335c919acea98
-
SSDEEP
12288:B9RrA4TFZl4C4giU5TnUUCi6PewcJBLUXPbPH:B9R3TFZlagiU9ncmXgbPH
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2092 e961f43fff26c449b276529686bb8728_JaffaCakes118mgr.exe -
Loads dropped DLL 1 IoCs
pid Process 2092 e961f43fff26c449b276529686bb8728_JaffaCakes118mgr.exe -
resource yara_rule behavioral2/memory/2092-10-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3596 2092 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e961f43fff26c449b276529686bb8728_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e961f43fff26c449b276529686bb8728_JaffaCakes118mgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4948 e961f43fff26c449b276529686bb8728_JaffaCakes118.exe 4948 e961f43fff26c449b276529686bb8728_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2092 4948 e961f43fff26c449b276529686bb8728_JaffaCakes118.exe 82 PID 4948 wrote to memory of 2092 4948 e961f43fff26c449b276529686bb8728_JaffaCakes118.exe 82 PID 4948 wrote to memory of 2092 4948 e961f43fff26c449b276529686bb8728_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e961f43fff26c449b276529686bb8728_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e961f43fff26c449b276529686bb8728_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\e961f43fff26c449b276529686bb8728_JaffaCakes118mgr.exeC:\Users\Admin\AppData\Local\Temp\e961f43fff26c449b276529686bb8728_JaffaCakes118mgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 101763⤵
- Program crash
PID:3596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2092 -ip 20921⤵PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD56553cd97f30044817c4e52f133f00fff
SHA10cb3a2e7d9bfea470943f3155b14021a6be8deb4
SHA256d808cea19fa170d3cf73c4d877b7fef0b3c20addea83e53a94e7f4df3fcc7d1e
SHA512e8a41616a056817dffdba13e65f82bb8d93e026d42f4bf1edb85ef84fb388afc7f0e0ab00c4ec0ed3399b14e2844fac2cdba6357f4bd963bde9311419e17a0da
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219