Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 13:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe
-
Size
1.7MB
-
MD5
0dff88193ece6bb2701c52013b6d0da1
-
SHA1
8a149c30cc284310589e35d12f17a4ef7a0c74a1
-
SHA256
c9573676d0ea809fa7b3af354d93efa3e5872ed2f6b0677dfc8173bd5b5197a2
-
SHA512
df6ab4e31a0bcc0beec37cb999696c16cbfe4435bcfab82413a171b2985894c9f2156ad27af47dbff2f19b1e2e84680854a69deba096737bc6e233752d045905
-
SSDEEP
49152:28QfAgftcJ+ux0xGGcHjYEwIafxobjevtlJ0MoXQ5IUNeIXu:28QfAgftcJ+ux0xGGcHcEwby
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2844 file2.exe -
Loads dropped DLL 1 IoCs
pid Process 2720 JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\wexplorer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wexplorer.exe" JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe -
resource yara_rule behavioral1/files/0x000b000000012259-3.dat upx behavioral1/memory/2844-8-0x0000000000400000-0x000000000050B000-memory.dmp upx behavioral1/memory/2844-13-0x0000000000400000-0x000000000050B000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2900 2720 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2844 file2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2720 JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2844 2720 JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe 30 PID 2720 wrote to memory of 2844 2720 JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe 30 PID 2720 wrote to memory of 2844 2720 JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe 30 PID 2720 wrote to memory of 2844 2720 JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe 30 PID 2720 wrote to memory of 2900 2720 JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe 31 PID 2720 wrote to memory of 2900 2720 JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe 31 PID 2720 wrote to memory of 2900 2720 JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe 31 PID 2720 wrote to memory of 2900 2720 JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0dff88193ece6bb2701c52013b6d0da1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\file2.exeC:\Users\Admin\AppData\Local\Temp\file2.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 2602⤵
- Program crash
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD535c183bf89ac2d3c1945eb40f37b8651
SHA180979e4687694670f15d237201dfc6395e867309
SHA256212f446a834bb1c2910dc6eb9ce831bb82a9f3cf7bb7f8c4be6ffcb171cb8891
SHA5121492497eefaf48a7fb222a698e43653b5413951ff8a682d1416c52f4db4a00755feae6bb7f13ea7c11a84bc7dc84011ffc73f546f15870f1b7c1d09ae384f613