Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe
-
Size
8.8MB
-
MD5
6a29264ddd822c26079e95f4e29ba7c1
-
SHA1
6ce02d2e246ed3e8b882f5b4124a77c767e70ba7
-
SHA256
461d29e6fb2392fa8a1023264f78f10a72bf2c614adbe6bd6715544a6adb8af9
-
SHA512
543414873ce3751c0a4284eaaf388ffac3b42f77ec7933a8e4c6b79ebd641c6b944aff9ab0f3c5db50f12c5f60d63972bab441f8984fbb0a065abc681053dd2d
-
SSDEEP
196608:o/MfvgKzq+sK8tXmOeguKcFA8fY+0WqlAnZj5e4f1YxVss:o/cDzq+v8Uh6yrfYTa7Fe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2388 is-01NI3.tmp -
Loads dropped DLL 3 IoCs
pid Process 2028 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 2388 is-01NI3.tmp 2388 is-01NI3.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-01NI3.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2388 is-01NI3.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2388 2028 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2388 2028 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2388 2028 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2388 2028 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2388 2028 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2388 2028 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2388 2028 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\is-BQ52R.tmp\is-01NI3.tmp"C:\Users\Admin\AppData\Local\Temp\is-BQ52R.tmp\is-01NI3.tmp" /SL4 $400F2 "C:\Users\Admin\AppData\Local\Temp\6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe" 8950295 568322⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
647KB
MD5e3b3a590cf551b2f4dca05de1a57faf3
SHA1c177501e38a425363d0e72f39768be9605660b19
SHA2564430587ffdb9a17c87bc786c5cfc7449f95c61be8fbeb7192268bd856efdd685
SHA51243e7ffc2cbead9fa75dfdc7ff3589f6f00db2fe94712befd6cda4541df58a9914de0b1c33edeaff16f63f378b98d4524be0f48da04639645a177114b99cb8c86
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3