Analysis
-
max time kernel
141s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 08:11
Static task
static1
Behavioral task
behavioral1
Sample
8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.exe
-
Size
782KB
-
MD5
8df9b22486f23f2822f2903b6efc8356
-
SHA1
cda472d3ae575b40384786cc42dd6964fefbb92d
-
SHA256
4c6d245c3ca7bade3d535c4cc9091e7179e7a4f92fc388447d937c2b94ea436d
-
SHA512
6efd81ab0e547cfa506d3c659fceda7c2d75620368ca9a79f1443fed39dc5d418a71657bb4fcf3120b69b5ce7f14dde0a34c82f5186d4c6f0fbbe6364da93181
-
SSDEEP
12288:vjr3VMPePabWrmBv5aEOdcOn/86k5oUSYCy4l7K31iD6luBJ07pvRObhDp:vjLgxarjLOmWnH4lm+Bp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1156 8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.tmp -
Loads dropped DLL 2 IoCs
pid Process 1156 8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.tmp 1156 8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.tmp -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: 8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 344 wrote to memory of 1156 344 8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.exe 84 PID 344 wrote to memory of 1156 344 8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.exe 84 PID 344 wrote to memory of 1156 344 8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Users\Admin\AppData\Local\Temp\is-IDUDU.tmp\8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-IDUDU.tmp\8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.tmp" /SL5="$60110,541129,54272,C:\Users\Admin\AppData\Local\Temp\8df9b22486f23f2822f2903b6efc8356_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5f0fd45370ddb35ccc45f8b0bf86c6d1d
SHA1ca2123f4a4729b52468fea01672914697209ffcf
SHA2561da87217a11b716ae8674b976bfc2a532c557f9cbb7210bb4a3392da21cb4c6b
SHA512de8f448f740906a482d1e7cdd24cdce5c77b477ad7610fe8bdac501bf4407f98d0bb7812c86e10cd8562f8002f8065dfa1679f47fcf4f8f91a33ab1fbf6422da
-
Filesize
721KB
MD569071ca28edf4a98aef4c7fa7a3f9bb7
SHA1a6dd33c57a6ee2814cd03a6797cd88b779403bac
SHA256ffeee602b8802816ce523b6cc09263804d4452e50abcbaef484cc0eef9b0c417
SHA512cea1b595947ede1555c077c0e3f61cb1fc68f4d1c58ac0cdd6b220dfda83407452215e0bf6ad4c661294e788e297ee40bfaa5e2f1a9bcedd78a12e357642fa71