Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 12:39
Static task
static1
Behavioral task
behavioral1
Sample
8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe
-
Size
92KB
-
MD5
8a64110eb7962a7020a3e626d9ad6d89
-
SHA1
e4edb8f5a987b11779eaba1d0a42fef331f3b6ba
-
SHA256
44029fa09c987870a2b4fc45048728f4c635876af2cd0e22157df0bcfc784441
-
SHA512
7bc9489ba339122fbce60fc7d24a9d4f9eb238f8906c54e3c1279cc2a36ddf2e4cad79c49998574eeea3f048f90ba89a09f177954aa336b32fb04c11ebcde34a
-
SSDEEP
1536:jM0gNI+RqihfQxtQg1nhFc9pJpk+tCwmg+Q6buWkJ2/tnJs1v8pEekNEkpYA00:jMbI+RFQxjJGJpTP65vFLGjNE5s
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4128 set thread context of 2156 4128 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2156 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe 2156 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4128 wrote to memory of 2156 4128 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe 84 PID 4128 wrote to memory of 2156 4128 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe 84 PID 4128 wrote to memory of 2156 4128 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe 84 PID 4128 wrote to memory of 2156 4128 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe 84 PID 4128 wrote to memory of 2156 4128 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe 84 PID 4128 wrote to memory of 2156 4128 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe 84 PID 4128 wrote to memory of 2156 4128 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe 84 PID 4128 wrote to memory of 2156 4128 8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a64110eb7962a7020a3e626d9ad6d89_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-