Analysis
-
max time kernel
130s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 06:59
Static task
static1
Behavioral task
behavioral1
Sample
7749b6f416eb1b13ecc197aeed4c6283_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7749b6f416eb1b13ecc197aeed4c6283_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7749b6f416eb1b13ecc197aeed4c6283_JaffaCakes118.exe
-
Size
91KB
-
MD5
7749b6f416eb1b13ecc197aeed4c6283
-
SHA1
245f22e6be3727f05016d70867755351e282efab
-
SHA256
4b546d56da04c318e7164f34aadcf71605f7940d429620c729633b4dcea1bd10
-
SHA512
1aa85eb4435859783f3e9f0c190c2931fb337f2b937c4b464320dbd899fd806999387798212a3e465cb05a1293d13835786d297340ad6b1149ce8daf73ce6a7c
-
SSDEEP
1536:FQQ2aTmnPfYc9Yh8Op3MrfENGaIkaN7ZG5NlbAAM9i:FQQ2aSPBGCOp3mEjIk47UNlbu9i
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7749b6f416eb1b13ecc197aeed4c6283_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2268 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2268 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 376 wrote to memory of 5032 376 7749b6f416eb1b13ecc197aeed4c6283_JaffaCakes118.exe 86 PID 376 wrote to memory of 5032 376 7749b6f416eb1b13ecc197aeed4c6283_JaffaCakes118.exe 86 PID 376 wrote to memory of 5032 376 7749b6f416eb1b13ecc197aeed4c6283_JaffaCakes118.exe 86 PID 5032 wrote to memory of 2268 5032 cmd.exe 88 PID 5032 wrote to memory of 2268 5032 cmd.exe 88 PID 5032 wrote to memory of 2268 5032 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7749b6f416eb1b13ecc197aeed4c6283_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7749b6f416eb1b13ecc197aeed4c6283_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\~29B.bat" "C:\Users\Admin\AppData\Local\Temp\7749b6f416eb1b13ecc197aeed4c6283_JaffaCakes118.exe""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 303⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232B
MD5e64b285371a918eb4d0d239bb9e1a0e4
SHA1f984eb6f3fc94fb35681e081712a507d71a545ff
SHA2566cf5ba6b62e5782093fa5c5d08d44f6bd3b7aa77a6246f7c221b8ad30f5ed673
SHA512262a853d8b892bdbe1a4694a67f52d5e2f7687c8b7be4aae54dd650926c5badb71c1d558d7420253d1df65dccee8b4e3baaccccd2047341de9ec10ed66ef6039