Analysis
-
max time kernel
95s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/yenf.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/yenf.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe
-
Size
519KB
-
MD5
65ec3c266fbb29c78bd931faa10c7947
-
SHA1
e5dfa9b4f41ad608b7cf26040a83ecbc4e4378af
-
SHA256
9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1
-
SHA512
8823e7eccbfa351e1fdf71a2f1c0a8430a37ce10bb3d11facf269408263a269c22fcccfd5cbf449693f894eccb780bf9f10f4f93248b506d641de098c6bab592
-
SSDEEP
6144:rGiP8k7NOQlfIFvnqzp6uAH8PiIIDNvFSsEIxIfFMIgvcVWRYeciBMh0nn5mpU4r:YD8faqM8PpIDtz+v8Yefp+j2GMkgmT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 428 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2188 428 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 428 wrote to memory of 4068 428 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 83 PID 428 wrote to memory of 4068 428 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 83 PID 428 wrote to memory of 4068 428 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe"2⤵PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 9842⤵
- Program crash
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 428 -ip 4281⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD546c925d5eaaaf5a7cdd55ffc845d037c
SHA1df0fc5da0fd9a0d288abac007e2ce470911fe25d
SHA256649b6cf91616337859aa74ec46fbdcfed6859475bb689c49c84eafdf33f796ec
SHA5129e124847e59a37ad9c11fdd94e5a8e0b4e93a273c43daecf2d357c94ffb55387b7070b45af688566a9d762cb7ad78cd4412b84ff32892a6fb7c8a7c8c3d53373