Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 15:59
Behavioral task
behavioral1
Sample
96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe
-
Size
382KB
-
MD5
96b415e6cdb5d5beb1f601fbd8b63a25
-
SHA1
15ddd36a15227683002bf49ed8d3e365d3caf48b
-
SHA256
1ca53771b31ebe0ad9180e40d639b76e1923aaa5abc90ebbcd48f27c6253f804
-
SHA512
4f7571096499e0a3d69915433b1c899e275208ac74d28add726e0a24df2199f8c115560c400165b5ff942def7414c6a1b0fa20f4ead5670da3febe81c9c1bb51
-
SSDEEP
6144:9aNeAfue3kbPtOxwOc4CC0JeItmkz7Tu+wIuo7FdmIYCKeR+S0yoAY7ZYC4YoY3Q:JNntOxNc4qRow6I57FdXiR82eYos6I52
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1992 96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1992 96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3768-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/files/0x0009000000023467-12.dat upx behavioral2/memory/1992-14-0x0000000000400000-0x0000000000486000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3768 96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3768 96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe 1992 96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3768 wrote to memory of 1992 3768 96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe 85 PID 3768 wrote to memory of 1992 3768 96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe 85 PID 3768 wrote to memory of 1992 3768 96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\96b415e6cdb5d5beb1f601fbd8b63a25_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5659ba000ef60bdb111703d1d3ff08a17
SHA1a126f1d7a12f627cdeb83d04984bc827c01cb8c7
SHA256f2f50ad7e53b70cf77a3127f3f490b7658b4f320178e1037c9073a8619728708
SHA512370ecd44e9a7e67f87ced26fcbabf7b1c44ebdf3e56a9944d9492c6ef3b1ee89b2de11e365a2c6c98a6f5722532ada41b2aff931f5f823886f6c9e8a862e8df6