Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 01:31
Behavioral task
behavioral1
Sample
8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe
-
Size
133KB
-
MD5
8287522588a1f610e9dfe7a181fd2b25
-
SHA1
1d567ee30ff40c49790934dd4e844b3144d3e99b
-
SHA256
61a279061a4f23b21f65934b5bcefec23efc0bace4212a6eea435e602d94e2d1
-
SHA512
2a8759dc9a9145049626315e015926dcd92904beb4449df912f30374d1a2208b54841327076d3776edd32913e20f048749aa0f0e8a39488864d6d0c83891546a
-
SSDEEP
3072:wu3ZmPuBRVeqXMOi08rWUwVXsgluzF1Nf1wFQfEcoC9Q:JZmPuBRZq08rWZ61NfoQfEZC9Q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2608 8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2688-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/files/0x0009000000023321-13.dat upx behavioral2/memory/2608-15-0x0000000000400000-0x0000000000486000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2688 8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2688 8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe 2608 8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2608 2688 8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe 86 PID 2688 wrote to memory of 2608 2688 8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe 86 PID 2688 wrote to memory of 2608 2688 8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8287522588a1f610e9dfe7a181fd2b25_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5be7dd0c73842ae445882161ea1c48086
SHA17d1bc03bbdb319ce6061098a815cee5e1583cbed
SHA256aa9b6c4691ac18f01299bd19d7f9025ce9c02c1ca8156fe59e938538608a072f
SHA5122565ab8570029e46e19ab6891398477618f9edfc6961aeee2f4ee05feeff8461bd12221ee8829b5e2a9adbc9d644e904da79c68034344a0a72929b67b70c2afb