Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 00:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe
-
Size
702KB
-
MD5
3a557d150e6b48343d2f15279339f32e
-
SHA1
a176f5e4f5a40947a499b39e71de8e65d0299021
-
SHA256
94142545a37248ce7c7770d447e17b0e002d395210a1e9845926c5c00dd0cf16
-
SHA512
444c7139f2a198e83e5747bfaed84377183538e963c1b1bcb78ac006fe0dbbb622b23fe95f3ec39b5147304e2f3c95c64a8d47cc564604ad32af10510f5c6c74
-
SSDEEP
12288:jZx6Nt8TyctWdD9jxwyck32hg0fElpAvVT+74cIFOo/yO3gjn0qaWjOzvkzlvCIS:Ipj2cCRSBC7LvzR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2004 vbc.exe -
Loads dropped DLL 1 IoCs
pid Process 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1936 set thread context of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30 -
resource yara_rule behavioral1/memory/2004-23-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral1/memory/2004-15-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral1/memory/2004-11-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral1/memory/2004-9-0x0000000000400000-0x00000000004E8000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30 PID 1936 wrote to memory of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30 PID 1936 wrote to memory of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30 PID 1936 wrote to memory of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30 PID 1936 wrote to memory of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30 PID 1936 wrote to memory of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30 PID 1936 wrote to memory of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30 PID 1936 wrote to memory of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30 PID 1936 wrote to memory of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30 PID 1936 wrote to memory of 2004 1936 JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3a557d150e6b48343d2f15279339f32e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98