Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe
-
Size
4.1MB
-
MD5
6f1cc40115bc37c088c7f9fe2efbb5fb
-
SHA1
79d4b1ae0718735970b83e5d64b5c8a5892375da
-
SHA256
20cdbacf737db5a31f918871573c9c8cfc27311a3de31b45d9fe30db5666bd4d
-
SHA512
0a6a1b2806fc4a1204ef437b78bb7c7a8835fd2eb6a2740b0fdb7fad9a414ac12b3d7ef0e9f9cfc327fc4198b31298ce75c81ca8d8252842841dd1799cfbbfc4
-
SSDEEP
98304:9HX21EdnjiqldXSgTX3R8FFd2LwL9xciDaO:932ujiqlH8F/2ODT
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\xsystem.dll 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe File created C:\Windows\SysWOW64\XPerWin.dll 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2240 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4684 4740 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe 87 PID 4740 wrote to memory of 4684 4740 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe 87 PID 4740 wrote to memory of 4684 4740 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe 87 PID 4684 wrote to memory of 2240 4684 cmd.exe 89 PID 4684 wrote to memory of 2240 4684 cmd.exe 89 PID 4684 wrote to memory of 2240 4684 cmd.exe 89 PID 4740 wrote to memory of 3012 4740 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe 91 PID 4740 wrote to memory of 3012 4740 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe 91 PID 4740 wrote to memory of 3012 4740 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe 91 PID 4740 wrote to memory of 1900 4740 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe 92 PID 4740 wrote to memory of 1900 4740 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe 92 PID 4740 wrote to memory of 1900 4740 6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f1cc40115bc37c088c7f9fe2efbb5fb_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 3.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sys.bat2⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sys2.bat2⤵
- System Location Discovery: System Language Discovery
PID:1900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
67B
MD501426eb293629fc9917b44b36701cb57
SHA181704ee7158adb9abd1c786dfa07d7703ddd843a
SHA256aa6cdc825062780c2530e0bfa53b1a5a0ac3f446f9d659a0f83e9297e0469ff7
SHA512c2441c228ab0759812b7a54ace0d7024e2bbaff19d41087956b4e75604991bd8f596c96f100c86da08a6ab1e257dc57c70b2f76d56d9b668e8482958a54ec15b
-
Filesize
102B
MD53b511fe052c5c700496d603196d17bb5
SHA1caf722ed0fdd58bf90c60bf1a566b32a93238e7a
SHA2566cf5fe4f7cf71417fb8fae84b6f553ade5a91f842a59800367cae9e1866c22ab
SHA512ad3f3858b0dd8a94420af76d5f46597bab5541f65050f081dc9bbcd1ee975c80ba0cad9b01c1a6076c2e92b65949f2c4a2fb6187b4798291087569208b25a616
-
Filesize
1022B
MD5dd313cde8ffa4d755b5f1eab926a41b0
SHA1ef85fd04caf9b60bdadb289f374a7587d9d32af9
SHA256faa9a8caac641a153382eb77e4c0e6239366b07b45824b9c54d7294b545bbdd1
SHA512b766b4491f6f264919bb8f356d86299201a7a52d3369458bbb7e60963626a6e5b866471e3075dc930781a793691d670b27ab572df03b249d991a59f816ae6b5d
-
Filesize
55B
MD577b31eee0aec92895533978981a39c9b
SHA1ce8183320cbbf719287c7c613f4efc1df465204a
SHA256b7311e13f74b6b0318e776b12282275ab0ce7fdac32c6548f93f8e2352321d74
SHA51202efd3aa74a40420603862aa62d8f5ecc90f031df9bf6ca5a321534db8fc994d7285fe06753cb05bd65f8a7a88a91ab8de02e71276ab9e36576638dafd21af7e
-
Filesize
9B
MD50464d2b4f2767a6b887b085cccf09aa8
SHA1100595878c00ce6a3d5527458c17e6665bcabec3
SHA256438aef6db89ab0d99cc93d035253a88822b10c01915ef5b464da74a6fac40bd8
SHA512a059e46eadfa63833c6cbff27369aa094cca8cd4e9ced4cd0900d27e63462b808aab704b80ea20df7ba88d3dbcd8ae77966402e9cc71a7a3d653aa872331ce9a