Analysis
-
max time kernel
139s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 08:42
Behavioral task
behavioral1
Sample
8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe
Resource
win7-20240729-en
8 signatures
150 seconds
General
-
Target
8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe
-
Size
38KB
-
MD5
8574b3b46b39fba4effe7bce2da8f8ae
-
SHA1
f41431f22376b337c9038a36379d08d342b2cae5
-
SHA256
7312f24b25af6feb430c51a9ed625ae868c9306b2506186ff19b1b0e2d7a4cc5
-
SHA512
a54c34bc6e960bf3ba762fef86b5322e1d2344070800b0e510872e3615683daa23e9905c1820af37d840365bcc0163a7a72b5d42467d8b49e543a38f98ca824e
-
SSDEEP
768:bJ67gyXUYOUnlq5hVp781b9hSpqTl5IqiRkBvdUL1bU:bQOqI5p7MhSp8vIqn0L1b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1124 svchost.exe -
resource yara_rule behavioral2/memory/1176-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1176-5-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1176 set thread context of 3124 1176 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3124 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 3124 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3124 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 3124 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1176 wrote to memory of 3124 1176 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 89 PID 1176 wrote to memory of 3124 1176 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 89 PID 1176 wrote to memory of 3124 1176 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 89 PID 1176 wrote to memory of 3124 1176 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 89 PID 1176 wrote to memory of 3124 1176 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 89 PID 1176 wrote to memory of 3124 1176 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 89 PID 3124 wrote to memory of 1124 3124 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 90 PID 3124 wrote to memory of 1124 3124 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 90 PID 3124 wrote to memory of 1124 3124 8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8574b3b46b39fba4effe7bce2da8f8ae_JaffaCakes118.exe2⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1124
-
-