Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe
-
Size
306KB
-
MD5
83a2a83909428e3321c2fcb736b6a2bd
-
SHA1
c52696a33bd03a4bfd501a9202c59c22907cef36
-
SHA256
4a8de11da406f0db044a4222074df12a7cf29032277e3d49487bcca178031210
-
SHA512
1a4f6178eb5d77f2475d39b6193fed479ffa36de6d257ee42fe04bf0d6b6f03bc2459cd6605116b14b6875630f11ceb2f7cf7ea0df2d35ee48d5cd642362b740
-
SSDEEP
6144:AC7DZ3dorI6Mil5PvYv3iEYqqdiN2dx7RZzaeTz4VM:AC7BT6MivvYSE7qdiN2dx7RZXT3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2580 sxe4EED.tmp -
Loads dropped DLL 2 IoCs
pid Process 2872 83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe 2872 83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxe4EED.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2580 2872 83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2580 2872 83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2580 2872 83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2580 2872 83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2580 2872 83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2580 2872 83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2580 2872 83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\83a2a83909428e3321c2fcb736b6a2bd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\sxe4EED.tmp"C:\Users\Admin\AppData\Local\Temp\sxe4EED.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5bd815b61f9948f93aface4033fbb4423
SHA1b5391484009b39053fc8b1bba63d444969bafcfa
SHA256b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76
SHA512a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71
-
Filesize
956KB
MD5f0adacea951635b1428044ffd4dd0361
SHA1b2bf6d422ed262d4739ded9966771bd2c9bcc261
SHA2560d01058948e894aadc2781d1c11cedb11fe11b6310e14db4caba4f66f33f476c
SHA51255440f12e91e02f47e56957972450abbe3f0e310ec4d0c1ac26a3085f13e3545c0eb5c43b50729bb4392557bb2987c532d578eb909b7ab52fe5d2156bd757f42