Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe
-
Size
14KB
-
MD5
81c744ac49a59d8a46f8c28895c090c2
-
SHA1
0dfcea7666a1f9cf39e2e4098bd53961f8d04e5a
-
SHA256
8ff72c5f2b760de3472f81e7ea4d25bd1ef9654777e2f7cfc962d174ce473f76
-
SHA512
c6b4f9e8a6860cd77a338177f8e690f5e3293d0fa34ce1c5ed6394d7515b5e53d6e74275d5ee16cecb20eb991aead3050762044c50a0561a799a3d67c1aca295
-
SSDEEP
192:PA5oRXrPIjd0zzbrzq6zQZ3HKGLbzAy43tZ518WTys3CxxH8CJX/z3UUj8WbTVB:POy70d0/Hzq6KEzhLWYquCJL3tbZB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1940 81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2096 1940 81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2096 1940 81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2096 1940 81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2096 1940 81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2364 2096 cmd.exe 32 PID 2096 wrote to memory of 2364 2096 cmd.exe 32 PID 2096 wrote to memory of 2364 2096 cmd.exe 32 PID 2096 wrote to memory of 2364 2096 cmd.exe 32 PID 2364 wrote to memory of 2108 2364 net.exe 33 PID 2364 wrote to memory of 2108 2364 net.exe 33 PID 2364 wrote to memory of 2108 2364 net.exe 33 PID 2364 wrote to memory of 2108 2364 net.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81c744ac49a59d8a46f8c28895c090c2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
-