Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
abe1e8794a3aae07ee3f907521ca06af_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
abe1e8794a3aae07ee3f907521ca06af_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
abe1e8794a3aae07ee3f907521ca06af_JaffaCakes118.exe
-
Size
122KB
-
MD5
abe1e8794a3aae07ee3f907521ca06af
-
SHA1
a94f8398d84da6c37cc44a97cada0b499962f55c
-
SHA256
9485d0fa4c8f6786c61486ba80f9a4d6e5e2a0c9ba0226927c51f837fba7e92d
-
SHA512
d999c9235aae697b91a48e22719d2b2c4fc75061395555085ffe73f5b70aefba094489235d2e276adf262c6916bd006eaeff9f9394664010b13c525a977aa853
-
SSDEEP
3072:0omEuwQPyttgji5tdorO1ZMiEpdbFQb4egye5JOa1aaJKr9:0Kpim029EZgeeaRJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation abe1e8794a3aae07ee3f907521ca06af_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4480 file1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abe1e8794a3aae07ee3f907521ca06af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 912 wrote to memory of 4480 912 abe1e8794a3aae07ee3f907521ca06af_JaffaCakes118.exe 87 PID 912 wrote to memory of 4480 912 abe1e8794a3aae07ee3f907521ca06af_JaffaCakes118.exe 87 PID 912 wrote to memory of 4480 912 abe1e8794a3aae07ee3f907521ca06af_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\abe1e8794a3aae07ee3f907521ca06af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abe1e8794a3aae07ee3f907521ca06af_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\file1.exe"C:\Users\Admin\AppData\Local\Temp\file1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD542674f041a9b0264d0a6c771191de3d0
SHA1ed41b98e07545eac410da96512720d9f2d9c25ca
SHA256002d353d8a185b7042cc722a0cd154840eebd1e589832179e91065ba16d9d755
SHA51269546e68b8b0bef8bbae2d182fb7741b638bd2cd47636978b2e154d50a21dae17a38362f29875ab2221d2967c620078f0e976fa189082fcbcd7343919df1f41d