Analysis
-
max time kernel
5s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe
-
Size
228KB
-
MD5
8a9717cb31f53b2ddeb8fc70dfb6dd16
-
SHA1
e449fcf67400d8d3c7df7341815cd11f1c487602
-
SHA256
14169e8f97adf6693fadd5f732dc445c7b59f8683c7938b3bd66fd21aa5f976b
-
SHA512
db5528713b869ae27cfa9eebdda4caafbdfcada3a8423b01d44e8b4126af9048cae7634a58a9571b40f1eb3bf93e3cfb6ebd6ce7ce4fa6fbfa9466a19fd450ce
-
SSDEEP
6144:c2ZpDuIqCHE28LuU4SDOZ+5H88EZeeSzbjnNu91RrqI/:cCDuxamSUDO4HfEZeeSLnA91
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 292 feaweh.exe -
Loads dropped DLL 2 IoCs
pid Process 2264 JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe 2264 JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feaweh.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 292 feaweh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2264 JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe 292 feaweh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 292 2264 JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe 31 PID 2264 wrote to memory of 292 2264 JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe 31 PID 2264 wrote to memory of 292 2264 JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe 31 PID 2264 wrote to memory of 292 2264 JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a9717cb31f53b2ddeb8fc70dfb6dd16.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\feaweh.exe"C:\Users\Admin\feaweh.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5ad4f7877066f268d05a17f8dde7e09d7
SHA1dc9ecec68cb531237852f2a6d8a8eecfdaf63997
SHA256b2639e0ee936625c36b7e0fa5361ba15703c2db4a002d134c95cda00002b1104
SHA512b21a4c56ff607a2d62d4103424688490489aea3398170acf87251a9983877f4b2a8350dbd8a822a3a930ebe8e851d44f0c74e5c6624c1463b056f7a421485291