Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe
-
Size
198KB
-
MD5
8b118ce465275c9dd06bf97d723f0c10
-
SHA1
e1947403aae81de407ed1e4ed2544edd6bf68bda
-
SHA256
015e9587adbb6454ad1023de0802c7e0dc4173630c1689f3d07f140a3267b5e8
-
SHA512
6f53fcabdd35d807ecb9347a4d7d7579311b5f9ba570a031a9d0e8efd2b60e37e818d631a5dfb74f1da4024de802745bfe73b2a3a464bb010ec980b1d11150d9
-
SSDEEP
6144:gEItBvqhI+nWpttCkflvJdVW+UHYqFbP+9Fwj9:gEI+lkN4pP+9Fwj9
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1376 e5764865.exe 3424 e5764a56.exe -
resource yara_rule behavioral2/files/0x0009000000023336-5.dat upx behavioral2/memory/1376-6-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/files/0x0008000000023394-8.dat upx behavioral2/memory/3424-10-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1376-12-0x0000000000400000-0x0000000000432000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3848 wrote to memory of 1376 3848 8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe 84 PID 3848 wrote to memory of 1376 3848 8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe 84 PID 3848 wrote to memory of 1376 3848 8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe 84 PID 3848 wrote to memory of 3424 3848 8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe 85 PID 3848 wrote to memory of 3424 3848 8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe 85 PID 3848 wrote to memory of 3424 3848 8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\e5764865.exe"C:\Users\Admin\AppData\Local\Temp\e5764865.exe"2⤵
- Executes dropped EXE
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\e5764a56.exe"C:\Users\Admin\AppData\Local\Temp\e5764a56.exe"2⤵
- Executes dropped EXE
PID:3424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD588d78c9bb9ac40db39c22d8368a889d0
SHA1fa13ac47646b74c0c878f87aec93639af126a324
SHA256367e36b5d5445c2a32e5be22f6a22c81ae98187e5c6fc5e8003272431cb577e6
SHA512c2a409b61f8cc36f63565b7139c665ac483645ac9391fefd34774328b14802b08d44f492b5e4b61631a11b4d184df4b5294c85f0ff4183fa4467f3bcb64ee41e
-
Filesize
119KB
MD564af4c462281885bfdd1f9cdfe1db67c
SHA1a8bc1c6cf7d286678f357cb6cd012952c13a40a6
SHA256f880db62f98487169f4936029833a25b2f7d5477847fd0cd3868e7e1a9f46004
SHA5124effd573e2ba228d272092f48d2ca4c5f904bccfa993dd7ac2915edf54e4d32317fba2c3ec441fa603ccac157dc53e5a5c8105fd145263bab1b1ed35f3f3c98e