Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe
-
Size
40KB
-
MD5
a2cdf9d1c2cae492b4deae938899445a
-
SHA1
a817051e31ef4c0549c88d9780d3b9319f7c65c7
-
SHA256
854d6326a479978d217825b0fb99f4e404774f2bec096665ada8cb28f9f29044
-
SHA512
bbd1132b526134b6d0bda199be971462a52f8159c794a22af03612bb08b6affafb5d8142ebcd4e0b73f2cd908632604502b6332a68a311c211a47ed090ec0651
-
SSDEEP
768:joPg+wLr96gLZmjzYnP7RhRvxKq2Y1rqI:cI4iKEFXvxKqHs
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\KB952567.log a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe File opened for modification C:\Windows\KB952567.log attrib.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2624 2712 a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe 84 PID 2712 wrote to memory of 2624 2712 a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe 84 PID 2712 wrote to memory of 2624 2712 a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe 84 PID 2624 wrote to memory of 2132 2624 cmd.exe 86 PID 2624 wrote to memory of 2132 2624 cmd.exe 86 PID 2624 wrote to memory of 2132 2624 cmd.exe 86 PID 2712 wrote to memory of 452 2712 a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe 90 PID 2712 wrote to memory of 452 2712 a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe 90 PID 2712 wrote to memory of 452 2712 a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe 90 PID 452 wrote to memory of 3496 452 cmd.exe 92 PID 452 wrote to memory of 3496 452 cmd.exe 92 PID 452 wrote to memory of 3496 452 cmd.exe 92 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2132 attrib.exe 3496 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2cdf9d1c2cae492b4deae938899445a_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c attrib C:\Windows\KB952567.log -r -h -s2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\KB952567.log -r -h -s3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2132
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib C:\Windows\KB952567.log -r -h -s2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\KB952567.log -r -h -s3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3496
-
-