Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
81c729d6cee2cb94e65c6a3258672024_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81c729d6cee2cb94e65c6a3258672024_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81c729d6cee2cb94e65c6a3258672024_JaffaCakes118.exe
-
Size
16KB
-
MD5
81c729d6cee2cb94e65c6a3258672024
-
SHA1
2b6143e95882ec38daea2bf47e8f6e0d8a7fa8fa
-
SHA256
8c27968c2c8e33f7f915cf9eb77335b58f5fb459442f2d628159af051542f6d5
-
SHA512
152d39e44a7658bcfb54a5ac7c586e25a952766feb18263e31851cae64440a9805edf74f1e43858c62e2b92e5fd13eeeefa496664515b7cc45f21717a0b74ae6
-
SSDEEP
192:nc461A/0LiQxqfKD6VkagfWhiQ7SMrZwl96ld/khi0dmgQCQjcW34DH/rG:nx0iQxqslQm396/r4AzIDH/C
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 f2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\system\f2.exe 81c729d6cee2cb94e65c6a3258672024_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81c729d6cee2cb94e65c6a3258672024_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 440 wrote to memory of 2840 440 81c729d6cee2cb94e65c6a3258672024_JaffaCakes118.exe 86 PID 440 wrote to memory of 2840 440 81c729d6cee2cb94e65c6a3258672024_JaffaCakes118.exe 86 PID 440 wrote to memory of 2840 440 81c729d6cee2cb94e65c6a3258672024_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\81c729d6cee2cb94e65c6a3258672024_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81c729d6cee2cb94e65c6a3258672024_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\WINDOWS\system\f2.exeC:/WINDOWS/system\f2.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f43852a976edcab5a7c82d248ce242d2
SHA1446ac2bb76e472c185f56b2b1246910a4438246d
SHA2564a38db0744930e1f5bfc0a82f63c907f7dc94270b930a3950e6a0abbc903c47f
SHA5123b4ab06664cb4c228ef0e85cc38d4035d4d2c0b4febd7fa410da65bbcc7b4eafbec924e8d14f02432125fa3d9fb22e50a87707b1c1028ad5d3f0bfbcd4b4075e