Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe
-
Size
298KB
-
MD5
74069a13d82ef37535b78882d1aff5ef
-
SHA1
b66b0e7bc09370e46be4e5938881e42d004ee409
-
SHA256
c78d754b63fe18e9fad70f8a203e9bbbe66912ff48ed0f8bb9cc96b249db9f60
-
SHA512
516a88ea4726a89c322e7a688389efeb84bb746b24f759e3b8346fc9d21f2a393fa4f5f4aeb9149a3c1d80ee8c750b93ff07b51a0204e67742020923493116a3
-
SSDEEP
6144:Nu71bw8IbvtdgZ+k0ELRnuj83Q+5iGH25fIXID8dFjElHVDvo6qoS:Nu7SvLYIkve8QCiGHc1D8dEA6qoS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2248 time.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\time.exe 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe File opened for modification C:\Windows\time.exe 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language time.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 time.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2248 wrote to memory of 244 2248 time.exe 87 PID 2248 wrote to memory of 244 2248 time.exe 87 PID 3132 wrote to memory of 368 3132 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe 88 PID 3132 wrote to memory of 368 3132 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe 88 PID 3132 wrote to memory of 368 3132 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\WNONSM.bat2⤵
- System Location Discovery: System Language Discovery
PID:368
-
-
C:\Windows\time.exeC:\Windows\time.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" 603672⤵PID:244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD544ccadbb12f4d062e8de016e247e2079
SHA10655092f5b4743abc8cd1a13da0727b21fdb73b1
SHA256b454617a61a5058d0212f38cdcc6ee252a360b6998ccd17702d8a369d01e749e
SHA5126f827d1ebe1c7bfd7840ee47593d8a7e2a9f57fca80e339ac96d0ad4524850ee01332791561dece308f4a674d8f447a77d64a69c7a820bc1ce6b7b9d1e62852b
-
Filesize
298KB
MD574069a13d82ef37535b78882d1aff5ef
SHA1b66b0e7bc09370e46be4e5938881e42d004ee409
SHA256c78d754b63fe18e9fad70f8a203e9bbbe66912ff48ed0f8bb9cc96b249db9f60
SHA512516a88ea4726a89c322e7a688389efeb84bb746b24f759e3b8346fc9d21f2a393fa4f5f4aeb9149a3c1d80ee8c750b93ff07b51a0204e67742020923493116a3