Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
a4654a1f18d2a1b979c97dc45a71dec6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4654a1f18d2a1b979c97dc45a71dec6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMPDIR/BetterInstaller.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$TEMPDIR/BetterInstaller.exe
Resource
win10v2004-20240802-en
General
-
Target
a4654a1f18d2a1b979c97dc45a71dec6_JaffaCakes118.exe
-
Size
154KB
-
MD5
a4654a1f18d2a1b979c97dc45a71dec6
-
SHA1
edefc18957c214d3921f19e8f518099da1902141
-
SHA256
f43fbe9eaed46889c31f94a8d6a17892e927774eb323eca9f9096855b6c3618d
-
SHA512
c3e69adfaa62f7e94c46364730f804eaa468badd80c22c56f90c8dfa83aa9db2aa98c4949c10aa2847635b9858f9722044dfc26c34cb8bead1d2a441db2511ab
-
SSDEEP
3072:S22ihA0m3BJa0dZ0i1/giLN2wZtMuyaD10IllOa1IYwqw:NA0m3+0dB/3J2MOuyaD10ISQIrqw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3732 betterinstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4654a1f18d2a1b979c97dc45a71dec6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language betterinstaller.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3732 betterinstaller.exe 3732 betterinstaller.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3708 wrote to memory of 3732 3708 a4654a1f18d2a1b979c97dc45a71dec6_JaffaCakes118.exe 84 PID 3708 wrote to memory of 3732 3708 a4654a1f18d2a1b979c97dc45a71dec6_JaffaCakes118.exe 84 PID 3708 wrote to memory of 3732 3708 a4654a1f18d2a1b979c97dc45a71dec6_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4654a1f18d2a1b979c97dc45a71dec6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a4654a1f18d2a1b979c97dc45a71dec6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\TempDIR\betterinstaller.exe"C:\Users\Admin\AppData\Local\TempDIR\betterinstaller.exe" /affid "mathflight" /id "mathflightfkqe" /name "Math Flight"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5d79b88bab3231ebebd3c6505ab68ce56
SHA13222e8dab740ba1d640cc66a9cd36070969deb80
SHA256d4032354c8ca3b93fd18414d6a7935bcecb18f25534b2259eeaf7d3081ec13ec
SHA512b8afbd52e74d8611714a33bd80a907be8080195bd574ceb0aa8ce44520c9cf6c40ccce4a4db9be0808b8b5a6b7b0fee17ee42f9cca67d69152dd1f1d8ddd99a9
-
Filesize
92B
MD51e2a1cfbba8a7e9679b59f9c0c72e325
SHA1eb4764a26583a74f84561770566ddebcbb9b2a74
SHA256f11d5216341afce56c0d00e0cb8ed379ce0fdb7629f50bf8762e6fed896572e4
SHA512ea12dd4df0ca2ce9a20da461940e48e255e15bff0e2a880dc22df71f575c833928e85130d2f94cafd8740914bdc5b7fb047aee88c05a9c4ba3d179b5950571da