Analysis
-
max time kernel
146s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
8cb76ce336cd55da833ed2add8fc2caa_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8cb76ce336cd55da833ed2add8fc2caa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8cb76ce336cd55da833ed2add8fc2caa_JaffaCakes118.exe
-
Size
304KB
-
MD5
8cb76ce336cd55da833ed2add8fc2caa
-
SHA1
26d2906e8ae0837782d94a5ea2b289db716ede01
-
SHA256
f3f111ab3859aff427f00d20a55c79660b1f5926cb350af70347d75d1d9bcec2
-
SHA512
fa68647ff85e50857d284933dfa8f94467a085ce8eacbeef82822e91c86fad28f3b72f4165571588035123aa8bc1c3d9ba733ec6eea8bcdf34e8ea954413ce7d
-
SSDEEP
3072:BJeJucxwPZoq/vd7AmQ27XBDlgCkkg+RTZeXi2WW+MN+0dPfZ:BJeJuewf97L7RDbkkg+RgzcMNnPB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3732 twcxyj.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cb76ce336cd55da833ed2add8fc2caa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twcxyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4600 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4600 PING.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4520 3660 8cb76ce336cd55da833ed2add8fc2caa_JaffaCakes118.exe 83 PID 3660 wrote to memory of 4520 3660 8cb76ce336cd55da833ed2add8fc2caa_JaffaCakes118.exe 83 PID 3660 wrote to memory of 4520 3660 8cb76ce336cd55da833ed2add8fc2caa_JaffaCakes118.exe 83 PID 4520 wrote to memory of 3732 4520 cmd.exe 86 PID 4520 wrote to memory of 3732 4520 cmd.exe 86 PID 4520 wrote to memory of 3732 4520 cmd.exe 86 PID 4520 wrote to memory of 4600 4520 cmd.exe 88 PID 4520 wrote to memory of 4600 4520 cmd.exe 88 PID 4520 wrote to memory of 4600 4520 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cb76ce336cd55da833ed2add8fc2caa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8cb76ce336cd55da833ed2add8fc2caa_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\uhugegx.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\twcxyj.exe"C:\Users\Admin\AppData\Local\Temp\twcxyj.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3732
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD52092b6d438111de2499b7547fce03fb5
SHA191b12e30bd260ad319149819ae1ad22efa7b9bf2
SHA2564f16de920c6ff947fbab089bc12b58b32ebb5e8c9be18a099fa10bd3dcdd2291
SHA512a45b283608a28b364128bbb40625fce4ffec8561f51834daff4afef254ce8017547a9a41dc26d21ac641b57b76572da306027ad6d5d8bd352afeb03ad03a347d
-
Filesize
124B
MD5f8998ff64cb0e5b90d98f256e2b6783e
SHA1975983f49cf098e5fbcfd98ef06da19592a2c3ff
SHA256f69a696d3ecd76cda9ac82fff4dfddf94c5a44c8c63de97f994feba8f8c829e1
SHA512626caa093eb27334109bb21951cd2ac06e489bbb4d6c852e9c3190500df3fc5addb7252dedf2eca3a5df40dee274d8ca897a5d608a6fc46005af54dd32b34c2d
-
Filesize
170B
MD5da8a3b8ec40bcfb225a10ab2aa144c49
SHA14b90672147ea2550dc80d51582cc961d65436ae8
SHA2569c4d0cc58c492937c7e2beb8f7c24070454030aab4e1e52dc03125cdd227aa9b
SHA512f62b09f1b6bdcf27ce36747a1c9cec5001304c4a22c5e4214f2983f16c5ebdaf950595a46b5faaa217f7202d969fa98e3ad72c6d6baa358e149f65010d2a5942