Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe
-
Size
127KB
-
MD5
a665896c9edfe05d4c93caad97aa6470
-
SHA1
2da11e36352a76d4908d1d6f8c668e9387d7e03f
-
SHA256
189da24af7d49bc5e4d20bcd64cde74f7bb076b7f23216ade7db5e9e788a0faf
-
SHA512
f3b125fb5e1507c0406c40374e40985b274bbae2cf92123bb910c98ef4396cb4f0f3171ef8635da450d9e4903f486338d49f36afbbaabee586179b7c4266faa0
-
SSDEEP
3072:4/6wJQi3dmGpak1sGb6cUmGvdhYVKwXzS3ZqcF9GOL:66tiNmI/Ydhkm3UY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3904 1632 a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe 85 PID 1632 wrote to memory of 3904 1632 a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe 85 PID 1632 wrote to memory of 3904 1632 a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe 85 PID 3904 wrote to memory of 2156 3904 cmd.exe 86 PID 3904 wrote to memory of 2156 3904 cmd.exe 86 PID 3904 wrote to memory of 2156 3904 cmd.exe 86 PID 3904 wrote to memory of 2668 3904 cmd.exe 87 PID 3904 wrote to memory of 2668 3904 cmd.exe 87 PID 3904 wrote to memory of 2668 3904 cmd.exe 87 PID 3904 wrote to memory of 4148 3904 cmd.exe 88 PID 3904 wrote to memory of 4148 3904 cmd.exe 88 PID 3904 wrote to memory of 4148 3904 cmd.exe 88 PID 3904 wrote to memory of 5096 3904 cmd.exe 89 PID 3904 wrote to memory of 5096 3904 cmd.exe 89 PID 3904 wrote to memory of 5096 3904 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\Temp\a00793.bat" "C:\Users\Admin\AppData\Local\Temp\a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\mode.commode 69,203⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Windows\SysWOW64\reg.exereg import 9.reg3⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
C:\Windows\SysWOW64\reg.exereg import 2.reg3⤵
- System Location Discovery: System Language Discovery
PID:4148
-
-
C:\Windows\SysWOW64\reg.exereg import 3.reg3⤵
- System Location Discovery: System Language Discovery
PID:5096
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694B
MD5ad139a2603f59dea9d23b1f3835dec75
SHA12e64fa8f2e6e83e8b42a739a86fcafd3fe76cc69
SHA25655036a682fb45268c22432ec647e877267bf814e3e643e2a566a1249d2d6bbb0
SHA512bd2e271dd9af0d618f67aafed1294b71bcd7e2dd7856dbdf0d56e0f0077e38ae913070d72455057376ef48000892ce913ddc5b0e12db2549c734091b6993f007