Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 01:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334e.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334e.exe
-
Size
176KB
-
MD5
26f89a4bdb6f16fcd431015d59b1334e
-
SHA1
a422c2c888f52bb95681b184e24844bb2f945cc9
-
SHA256
7febffaa7650c9fee595f5385f52c916999a7cd286b6bd962e5fcf381a2c1af0
-
SHA512
78954e06f880376c77266654b8cb430988b2d00b61441312050471b008703d4e216838942bbdf279bcef3dc0f9b4e6792d407c8a0e4b221069b4fe96653337da
-
SSDEEP
3072:GJLrp0cQ7QAINqPDHQncySAq6lZkJoOPs/XOcxDMMwsIR1OCMc907frG5:KLO7QAISySAWaKs/rNwsIRQCMc9X5
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 3828 JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334emgr.exe -
Loads dropped DLL 1 IoCs
pid Process 3828 JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334emgr.exe -
resource yara_rule behavioral2/memory/3828-7-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3116 3828 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334emgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3828 4528 JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334e.exe 83 PID 4528 wrote to memory of 3828 4528 JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334e.exe 83 PID 4528 wrote to memory of 3828 4528 JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334e.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334emgr.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_26f89a4bdb6f16fcd431015d59b1334emgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 101803⤵
- Program crash
PID:3116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3828 -ip 38281⤵PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD58abf6898662a995642dd979ff1fe5eef
SHA108aeda19120993801a6f3a8aa2b73b559ed361ad
SHA2568aa6d0613c1ad6326d92678bc90dd10be1fba7a5b5f9d7a4a6fac6a42baf94cb
SHA512a1e88bde3478d8a0c74824998b13e1fdf4484eec444540352076acc43675ecd2daed86e719b3889e7e8ce2104b2b7259a237b42d474acbca8f7e7fb3f37a3313
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219