Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 03:19
Static task
static1
Behavioral task
behavioral1
Sample
849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe
-
Size
18KB
-
MD5
849e15927a35d8bf86f608954f7492f9
-
SHA1
3411f28b64c4bfac39a9dd10be9b588bc1c6d24c
-
SHA256
376a9f99ae5ed728e1c101eb92e85c3af6c8ca33ec2157f797ecf6c7ed57e845
-
SHA512
423db3965c106520d65245a0881860c0007e4540198e4ed97c52d179cfcb1a10d9b5b09f5eb67dcf05eacd744fdae1ceca8dfc9fcf6a5fee505491bd8cfd57c8
-
SSDEEP
384:YgBIrIV/Y/aDhtwyG5q3nXTmwKa2Ta/xnkFAM+/KanZAcaqSUhqTOxnkFAM+/Z:LOrsOaDg4XR/xkG7RnZnDSiqKxkG7B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2348 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2348 2560 849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2348 2560 849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2348 2560 849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2348 2560 849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\b.bat "C:\Users\Admin\AppData\Local\Temp\849e15927a35d8bf86f608954f7492f9_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58B
MD526c4ec1c13398870f85d73138ea812db
SHA1d12a59f347a5e7e6c6290b154ee440d1f54351ce
SHA2565fa098b681456e794055c568e833b52620632c3fa3d0b3a24dcce7872a60319c
SHA51269cd63943a3b70a1915fdc7d02abeeadeb783549c6028ce1749f8d881acd707c7d9be9b0904760d1de7b157d12ee1bdc8ae6b0b1ab9bfe0ecb9fe27cf9f2c826