Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe
-
Size
8.8MB
-
MD5
6a29264ddd822c26079e95f4e29ba7c1
-
SHA1
6ce02d2e246ed3e8b882f5b4124a77c767e70ba7
-
SHA256
461d29e6fb2392fa8a1023264f78f10a72bf2c614adbe6bd6715544a6adb8af9
-
SHA512
543414873ce3751c0a4284eaaf388ffac3b42f77ec7933a8e4c6b79ebd641c6b944aff9ab0f3c5db50f12c5f60d63972bab441f8984fbb0a065abc681053dd2d
-
SSDEEP
196608:o/MfvgKzq+sK8tXmOeguKcFA8fY+0WqlAnZj5e4f1YxVss:o/cDzq+v8Uh6yrfYTa7Fe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1028 is-TTR37.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-TTR37.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1028 2276 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 84 PID 2276 wrote to memory of 1028 2276 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 84 PID 2276 wrote to memory of 1028 2276 6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\is-0VAVJ.tmp\is-TTR37.tmp"C:\Users\Admin\AppData\Local\Temp\is-0VAVJ.tmp\is-TTR37.tmp" /SL4 $602B2 "C:\Users\Admin\AppData\Local\Temp\6a29264ddd822c26079e95f4e29ba7c1_JaffaCakes118.exe" 8950295 568322⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
647KB
MD5e3b3a590cf551b2f4dca05de1a57faf3
SHA1c177501e38a425363d0e72f39768be9605660b19
SHA2564430587ffdb9a17c87bc786c5cfc7449f95c61be8fbeb7192268bd856efdd685
SHA51243e7ffc2cbead9fa75dfdc7ff3589f6f00db2fe94712befd6cda4541df58a9914de0b1c33edeaff16f63f378b98d4524be0f48da04639645a177114b99cb8c86