Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe
-
Size
60KB
-
MD5
a3e6bc5ae46d56142e66699dcd112c13
-
SHA1
580f38d4c0c54394b452e5ecddc97dd8a5c82a71
-
SHA256
a9126586febe5b201569c002a20e195ae33c890914268d8ea85a7d31bfe39a7b
-
SHA512
7b5c5b087ae6729b1abc392b0241ad9d7f5ec3b83c8c8a009f43db2e499d2588a2d8e4cd8bf5a2f76dfde183eaf77a38f3241a994558b1ea4e6aded3553ff76b
-
SSDEEP
768:7o4+e0pi+Rgy1QzTGfEyN21oiYDsP6EwO:0461gGQlysSDDsP6Ew
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\KB952567.log a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe File opened for modification C:\Windows\KB952567.log attrib.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3664 wrote to memory of 2444 3664 a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe 84 PID 3664 wrote to memory of 2444 3664 a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe 84 PID 3664 wrote to memory of 2444 3664 a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe 84 PID 2444 wrote to memory of 2748 2444 cmd.exe 86 PID 2444 wrote to memory of 2748 2444 cmd.exe 86 PID 2444 wrote to memory of 2748 2444 cmd.exe 86 PID 3664 wrote to memory of 1664 3664 a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe 90 PID 3664 wrote to memory of 1664 3664 a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe 90 PID 3664 wrote to memory of 1664 3664 a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe 90 PID 1664 wrote to memory of 2816 1664 cmd.exe 92 PID 1664 wrote to memory of 2816 1664 cmd.exe 92 PID 1664 wrote to memory of 2816 1664 cmd.exe 92 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2748 attrib.exe 2816 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\cmd.execmd /c attrib C:\Windows\KB952567.log -r -h -s2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\KB952567.log -r -h -s3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib C:\Windows\KB952567.log -r -h -s2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\KB952567.log -r -h -s3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2816
-
-