Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 18:58
Behavioral task
behavioral1
Sample
JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe
-
Size
1.7MB
-
MD5
6ed097c7478105da712177a6d49d7e70
-
SHA1
bb4df3e1299b83fa446c7cb641e69594cd11576a
-
SHA256
88238b9229cb7ed4864dc3ee37eea6cb8c098419badf807a19045f18167e891c
-
SHA512
c45e9db6885efa437ad5ebf8170d8665fd719d43bb7c99d27adc06b9fdbc642d50bdf8edd510a3dd583aeeb1331f5ead028159c3361fb742ad1d93d230a58a83
-
SSDEEP
24576:xthEVaPqLB/OXA8faoMTRpyikthEVaPqLB/OXA8faoMTRpyiZ:pEVUcwkB3V4EVUcwkB3VZ
Malware Config
Signatures
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4332-10-0x0000000000400000-0x0000000000516000-memory.dmp autoit_exe behavioral2/memory/1688-25-0x0000000000400000-0x0000000000516000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1688 set thread context of 3928 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 83 -
resource yara_rule behavioral2/memory/4332-0-0x0000000000400000-0x0000000000516000-memory.dmp upx behavioral2/memory/1688-8-0x0000000000400000-0x0000000000516000-memory.dmp upx behavioral2/memory/4332-10-0x0000000000400000-0x0000000000516000-memory.dmp upx behavioral2/memory/1688-25-0x0000000000400000-0x0000000000516000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1380 3928 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4332 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 4332 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 4332 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4332 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 4332 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 4332 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4332 wrote to memory of 1688 4332 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 82 PID 4332 wrote to memory of 1688 4332 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 82 PID 4332 wrote to memory of 1688 4332 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 82 PID 1688 wrote to memory of 3928 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 83 PID 1688 wrote to memory of 3928 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 83 PID 1688 wrote to memory of 3928 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 83 PID 1688 wrote to memory of 3928 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 83 PID 1688 wrote to memory of 3928 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 83 PID 1688 wrote to memory of 3928 1688 JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ed097c7478105da712177a6d49d7e70.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\test.a3x"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
\??\c:\windows\SysWOW64\svchost.exe"c:\windows\system32\svchost.exe"3⤵PID:3928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 204⤵
- Program crash
PID:1380
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3928 -ip 39281⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD54e4cddd13c848074c11d4f1d291c6aba
SHA153e0002cead55ba20ef6261b1a43967e612fb558
SHA2564070ad29af1c0328ceec6b7032f2ff7fa94ee4adaead367f32c549d13ebbcf77
SHA512261bca93ac6b50af8c96b22d74b5a740380516869b3773c5f162924e8825770ebf6b65da83ac578cb592cfe9997bee8433e55648d32c2f2da83297904fbebb76