Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe
-
Size
178KB
-
MD5
73b7ddabf675ca2d58a79b3edf45da32
-
SHA1
ae6fc7ea40271f1805a9c435cd37ef93f26eb478
-
SHA256
6ecd9e4891ee35776f4094870f5fec73e1912b9b63629268a92261674c6eba6b
-
SHA512
2d57deb64681f1d747461968b16b5fa82a8eb81658335d039a8118329ce31ac231472124362520a822770d65f482c14beb412626756825371b3aa9e50cd726ed
-
SSDEEP
3072:u0Gox2PD7tC6PN5k/WqGIvMEhc+5n6CdJK8GcBHNmjoH90DGzhQ:6ogPGWqGU/n6CbzGcBIMHIGl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3856 Bnynua.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Bnynua.exe 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe File opened for modification C:\Windows\Bnynua.exe 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Bnynua.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Bnynua.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnynua.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Microsoft\Internet Explorer\Main Bnynua.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Microsoft\Internet Explorer\International Bnynua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe 3856 Bnynua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3664 wrote to memory of 3856 3664 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe 92 PID 3664 wrote to memory of 3856 3664 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe 92 PID 3664 wrote to memory of 3856 3664 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\Bnynua.exeC:\Windows\Bnynua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD573b7ddabf675ca2d58a79b3edf45da32
SHA1ae6fc7ea40271f1805a9c435cd37ef93f26eb478
SHA2566ecd9e4891ee35776f4094870f5fec73e1912b9b63629268a92261674c6eba6b
SHA5122d57deb64681f1d747461968b16b5fa82a8eb81658335d039a8118329ce31ac231472124362520a822770d65f482c14beb412626756825371b3aa9e50cd726ed
-
Filesize
390B
MD523f7c0ec479c225594c0f582441703b0
SHA14aee406a0ffd6023f1c1b70ce4b2f1067aa1d8fa
SHA256695c2221ffe4bf8c363a205921a38bec86ce30a68cd736fba35e93df7d88dbb7
SHA5126137067eca36a1e26a34d70be5ed0038db9c04b2757dc1d137a2d35022e2b1d874e1c9825a1e1eed5aae03215b4e56c9b94ecd6c468b8caf09cd7757e2c11068