Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe
-
Size
127KB
-
MD5
a665896c9edfe05d4c93caad97aa6470
-
SHA1
2da11e36352a76d4908d1d6f8c668e9387d7e03f
-
SHA256
189da24af7d49bc5e4d20bcd64cde74f7bb076b7f23216ade7db5e9e788a0faf
-
SHA512
f3b125fb5e1507c0406c40374e40985b274bbae2cf92123bb910c98ef4396cb4f0f3171ef8635da450d9e4903f486338d49f36afbbaabee586179b7c4266faa0
-
SSDEEP
3072:4/6wJQi3dmGpak1sGb6cUmGvdhYVKwXzS3ZqcF9GOL:66tiNmI/Ydhkm3UY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2288 wrote to memory of 548 2288 a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe 31 PID 2288 wrote to memory of 548 2288 a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe 31 PID 2288 wrote to memory of 548 2288 a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe 31 PID 2288 wrote to memory of 548 2288 a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe 31 PID 548 wrote to memory of 1800 548 cmd.exe 32 PID 548 wrote to memory of 1800 548 cmd.exe 32 PID 548 wrote to memory of 1800 548 cmd.exe 32 PID 548 wrote to memory of 1800 548 cmd.exe 32 PID 548 wrote to memory of 2384 548 cmd.exe 33 PID 548 wrote to memory of 2384 548 cmd.exe 33 PID 548 wrote to memory of 2384 548 cmd.exe 33 PID 548 wrote to memory of 2384 548 cmd.exe 33 PID 548 wrote to memory of 2060 548 cmd.exe 34 PID 548 wrote to memory of 2060 548 cmd.exe 34 PID 548 wrote to memory of 2060 548 cmd.exe 34 PID 548 wrote to memory of 2060 548 cmd.exe 34 PID 548 wrote to memory of 2992 548 cmd.exe 35 PID 548 wrote to memory of 2992 548 cmd.exe 35 PID 548 wrote to memory of 2992 548 cmd.exe 35 PID 548 wrote to memory of 2992 548 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\Temp\a00363.bat" "C:\Users\Admin\AppData\Local\Temp\a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\mode.commode 69,203⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Windows\SysWOW64\reg.exereg import 9.reg3⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Windows\SysWOW64\reg.exereg import 2.reg3⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\reg.exereg import 3.reg3⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694B
MD5ad139a2603f59dea9d23b1f3835dec75
SHA12e64fa8f2e6e83e8b42a739a86fcafd3fe76cc69
SHA25655036a682fb45268c22432ec647e877267bf814e3e643e2a566a1249d2d6bbb0
SHA512bd2e271dd9af0d618f67aafed1294b71bcd7e2dd7856dbdf0d56e0f0077e38ae913070d72455057376ef48000892ce913ddc5b0e12db2549c734091b6993f007