Analysis
-
max time kernel
140s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
861f63cfb1d6d92aaf99b7e809deacb9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
861f63cfb1d6d92aaf99b7e809deacb9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
861f63cfb1d6d92aaf99b7e809deacb9_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
861f63cfb1d6d92aaf99b7e809deacb9
-
SHA1
d14128250877b4a822e1426ff7a68182df556c8f
-
SHA256
44b2abd60814d970c3d8c52686146fec6f9bd8c25c782354be894a6fd0f6bf03
-
SHA512
71dd17afe463e5151e5478b533e3a435e502eae12965fb50c4236bed9c91911e16cc0ad0a2e498a0b51e39931201d1cf73d36d79507dbfc20479a769d799361b
-
SSDEEP
49152:Qoa1taC070dCIJ4iutVlZ7EaWv3SqztGURZnf:Qoa1taC0nIyiutVlZodilURZf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1220 D7D2.tmp -
Executes dropped EXE 1 IoCs
pid Process 1220 D7D2.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 861f63cfb1d6d92aaf99b7e809deacb9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D7D2.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4668 wrote to memory of 1220 4668 861f63cfb1d6d92aaf99b7e809deacb9_JaffaCakes118.exe 86 PID 4668 wrote to memory of 1220 4668 861f63cfb1d6d92aaf99b7e809deacb9_JaffaCakes118.exe 86 PID 4668 wrote to memory of 1220 4668 861f63cfb1d6d92aaf99b7e809deacb9_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\861f63cfb1d6d92aaf99b7e809deacb9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\861f63cfb1d6d92aaf99b7e809deacb9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp" --splashC:\Users\Admin\AppData\Local\Temp\861f63cfb1d6d92aaf99b7e809deacb9_JaffaCakes118.exe 837DC8AE63ECE7A5F4B4FA62F586E409B165711617CFD83EA74540D5B118C787A2D5232A771E890A724E7E1A7D6E30616B37BCBBEB9E23A4F715B3BF090682692⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD58ed94cdb8d789ffc37c291a6ab790348
SHA121ba734bbaaa73e81a99e2dae67584de485d9a0b
SHA25658dfe84bd20ff3573b23c169a54002c90fc83e610a5445582fc77aa04ddd5a71
SHA512fd2305a243834ab3f8382cd0d7bea54d1d831f1d5970e475c488a81256d6d11d3c435a0a30285bbd092116e5e0ece1085e0ec75f1f090a5fed29fc4ad7294421