Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2025, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe
-
Size
1016KB
-
MD5
6f4f9522086eac0071069f0a799aa7de
-
SHA1
cf4544d75145060da77eb780444e1ef15984fd6f
-
SHA256
908fea0d45e0948714aab5c1abd5daa664eeef4dcf11d27f8b9cfbd30fc1168c
-
SHA512
104c2fc99cd7b2a91e9aa446712d5802a88d5fc64fc28dce03db5e31c6f30f8d59f782a5b7021107be686c8a233320ae0b82a6e956e829e1d85569780bd2b2c5
-
SSDEEP
24576:6c//////qPzZSQcEQhN/nrNC3fB39BRbWMmdbesfmIt:6c//////qPzORhNPrNC3RcMQasfmK
Malware Config
Signatures
-
Phorphiex family
-
Executes dropped EXE 2 IoCs
pid Process 1800 guozi.exe 4604 ·çÔÆ20100222-2°æ.exe -
resource yara_rule behavioral2/files/0x0007000000023d6b-10.dat vmprotect behavioral2/memory/4604-11-0x0000000000400000-0x0000000000662000-memory.dmp vmprotect behavioral2/memory/4604-13-0x0000000000400000-0x0000000000662000-memory.dmp vmprotect -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\wshipv4.dll guozi.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3940 1800 WerFault.exe 89 3952 4604 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guozi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ·çÔÆ20100222-2°æ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1800 guozi.exe 1800 guozi.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1800 guozi.exe Token: SeDebugPrivilege 1800 guozi.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4092 4532 JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe 85 PID 4532 wrote to memory of 4092 4532 JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe 85 PID 4532 wrote to memory of 4092 4532 JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe 85 PID 4532 wrote to memory of 4904 4532 JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe 87 PID 4532 wrote to memory of 4904 4532 JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe 87 PID 4532 wrote to memory of 4904 4532 JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe 87 PID 4092 wrote to memory of 1800 4092 cmd.exe 89 PID 4092 wrote to memory of 1800 4092 cmd.exe 89 PID 4092 wrote to memory of 1800 4092 cmd.exe 89 PID 4904 wrote to memory of 4604 4904 cmd.exe 90 PID 4904 wrote to memory of 4604 4904 cmd.exe 90 PID 4904 wrote to memory of 4604 4904 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f4f9522086eac0071069f0a799aa7de.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\guozi.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\guozi.exeC:\Users\Admin\AppData\Local\Temp\guozi.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 3284⤵
- Program crash
PID:3940
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\·çÔÆ20100222-2°æ.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\·çÔÆ20100222-2°æ.exeC:\Users\Admin\AppData\Local\Temp\·çÔÆ20100222-2°æ.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 5284⤵
- Program crash
PID:3952
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1800 -ip 18001⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4604 -ip 46041⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5d434d83c5958bb61057e0a2d2abb19cd
SHA16726e5c6a4fe792816939e75ed76591ca9fbed43
SHA25618f7f7b330c8f53bc42b9d498219ce58bdf337e82dc7a87c81b16020f9207bf2
SHA51276758474649abef209017c0363f583f5fe38d7e6bff65af7f14c1d5bc0af0bae0350e4d31e0cc9dfc90074d0550d6e48fa07772e128879da25ff1e705f33562e
-
Filesize
940KB
MD5e9d30ab511f82de844601586e348074c
SHA1c7a00287019b57c6950060e3a9df56848ebc3dc5
SHA256176042c025ef1a543b622612e6c612b22b34204b96a7572f1903646164a30745
SHA512d242132798b386a47c95e20b4bb9658674e8d9f6a5640cc8a9cb87f52d2a23bb094c066cc4116875f868d722cccf9e365618ec4a52d186f51544bb07cf24f949