Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
ac1515570f1ce8bf3d1655030128ec06_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac1515570f1ce8bf3d1655030128ec06_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac1515570f1ce8bf3d1655030128ec06_JaffaCakes118.exe
-
Size
160KB
-
MD5
ac1515570f1ce8bf3d1655030128ec06
-
SHA1
e26aaf471df45ecf5231825aae9952eb6d6e7161
-
SHA256
67fffd16ff4c444cfd1cf5df903834169fcfbd21c50c74f527b49ca3590e13bd
-
SHA512
d4836e2caae4f05c41ce60b6a518534304b0a9f2065011763536f655c0b6db129af79622e2df1ece71763aabfd44bd995e7b353f16bd69a18abdf30f1b13a646
-
SSDEEP
3072:arGzHMAu2usKEP6oMjSv94FEp7SdiIscOG93lDAriU6:arwHMAuLmrL9F8DscOGV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language azvklz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chothcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxmdwxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yeagqghkiumco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnpugclblu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ravowllmfvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftjnlxyxeffy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qksk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tztgwjdvaseho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtssmrwurb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbyzwlmzlxwvm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhtxndpnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac1515570f1ce8bf3d1655030128ec06_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ivxrnfklazjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymbvjm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilzqgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vzzw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yindcydngcz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewjkaqakzgwhv.exe -
Suspicious behavior: RenamesItself 21 IoCs
pid Process 3464 ac1515570f1ce8bf3d1655030128ec06_JaffaCakes118.exe 3912 ivxrnfklazjpv.exe 4200 azvklz.exe 3596 ymbvjm.exe 4868 tztgwjdvaseho.exe 452 tdda.exe 3076 ilzqgr.exe 4820 rtssmrwurb.exe 944 ndjq.exe 1744 chothcn.exe 2224 nxmdwxh.exe 1660 ftjnlxyxeffy.exe 4744 yeagqghkiumco.exe 2804 wnye.exe 4176 vzzw.exe 3832 yindcydngcz.exe 960 fbyzwlmzlxwvm.exe 2268 tnpugclblu.exe 404 qksk.exe 1676 ravowllmfvy.exe 780 ewjkaqakzgwhv.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3464 wrote to memory of 3912 3464 ac1515570f1ce8bf3d1655030128ec06_JaffaCakes118.exe 99 PID 3464 wrote to memory of 3912 3464 ac1515570f1ce8bf3d1655030128ec06_JaffaCakes118.exe 99 PID 3464 wrote to memory of 3912 3464 ac1515570f1ce8bf3d1655030128ec06_JaffaCakes118.exe 99 PID 3912 wrote to memory of 4200 3912 ivxrnfklazjpv.exe 103 PID 3912 wrote to memory of 4200 3912 ivxrnfklazjpv.exe 103 PID 3912 wrote to memory of 4200 3912 ivxrnfklazjpv.exe 103 PID 4200 wrote to memory of 3596 4200 azvklz.exe 104 PID 4200 wrote to memory of 3596 4200 azvklz.exe 104 PID 4200 wrote to memory of 3596 4200 azvklz.exe 104 PID 3596 wrote to memory of 4868 3596 ymbvjm.exe 105 PID 3596 wrote to memory of 4868 3596 ymbvjm.exe 105 PID 3596 wrote to memory of 4868 3596 ymbvjm.exe 105 PID 4868 wrote to memory of 452 4868 tztgwjdvaseho.exe 108 PID 4868 wrote to memory of 452 4868 tztgwjdvaseho.exe 108 PID 4868 wrote to memory of 452 4868 tztgwjdvaseho.exe 108 PID 452 wrote to memory of 3076 452 tdda.exe 110 PID 452 wrote to memory of 3076 452 tdda.exe 110 PID 452 wrote to memory of 3076 452 tdda.exe 110 PID 3076 wrote to memory of 4820 3076 ilzqgr.exe 111 PID 3076 wrote to memory of 4820 3076 ilzqgr.exe 111 PID 3076 wrote to memory of 4820 3076 ilzqgr.exe 111 PID 4820 wrote to memory of 944 4820 rtssmrwurb.exe 112 PID 4820 wrote to memory of 944 4820 rtssmrwurb.exe 112 PID 4820 wrote to memory of 944 4820 rtssmrwurb.exe 112 PID 944 wrote to memory of 1744 944 ndjq.exe 113 PID 944 wrote to memory of 1744 944 ndjq.exe 113 PID 944 wrote to memory of 1744 944 ndjq.exe 113 PID 1744 wrote to memory of 2224 1744 chothcn.exe 115 PID 1744 wrote to memory of 2224 1744 chothcn.exe 115 PID 1744 wrote to memory of 2224 1744 chothcn.exe 115 PID 2224 wrote to memory of 1660 2224 nxmdwxh.exe 116 PID 2224 wrote to memory of 1660 2224 nxmdwxh.exe 116 PID 2224 wrote to memory of 1660 2224 nxmdwxh.exe 116 PID 1660 wrote to memory of 4744 1660 ftjnlxyxeffy.exe 117 PID 1660 wrote to memory of 4744 1660 ftjnlxyxeffy.exe 117 PID 1660 wrote to memory of 4744 1660 ftjnlxyxeffy.exe 117 PID 4744 wrote to memory of 2804 4744 yeagqghkiumco.exe 118 PID 4744 wrote to memory of 2804 4744 yeagqghkiumco.exe 118 PID 4744 wrote to memory of 2804 4744 yeagqghkiumco.exe 118 PID 2804 wrote to memory of 4176 2804 wnye.exe 119 PID 2804 wrote to memory of 4176 2804 wnye.exe 119 PID 2804 wrote to memory of 4176 2804 wnye.exe 119 PID 4176 wrote to memory of 3832 4176 vzzw.exe 127 PID 4176 wrote to memory of 3832 4176 vzzw.exe 127 PID 4176 wrote to memory of 3832 4176 vzzw.exe 127 PID 3832 wrote to memory of 960 3832 yindcydngcz.exe 128 PID 3832 wrote to memory of 960 3832 yindcydngcz.exe 128 PID 3832 wrote to memory of 960 3832 yindcydngcz.exe 128 PID 960 wrote to memory of 2268 960 fbyzwlmzlxwvm.exe 129 PID 960 wrote to memory of 2268 960 fbyzwlmzlxwvm.exe 129 PID 960 wrote to memory of 2268 960 fbyzwlmzlxwvm.exe 129 PID 2268 wrote to memory of 404 2268 tnpugclblu.exe 130 PID 2268 wrote to memory of 404 2268 tnpugclblu.exe 130 PID 2268 wrote to memory of 404 2268 tnpugclblu.exe 130 PID 404 wrote to memory of 1676 404 qksk.exe 131 PID 404 wrote to memory of 1676 404 qksk.exe 131 PID 404 wrote to memory of 1676 404 qksk.exe 131 PID 1676 wrote to memory of 780 1676 ravowllmfvy.exe 135 PID 1676 wrote to memory of 780 1676 ravowllmfvy.exe 135 PID 1676 wrote to memory of 780 1676 ravowllmfvy.exe 135 PID 780 wrote to memory of 3028 780 ewjkaqakzgwhv.exe 136 PID 780 wrote to memory of 3028 780 ewjkaqakzgwhv.exe 136 PID 780 wrote to memory of 3028 780 ewjkaqakzgwhv.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac1515570f1ce8bf3d1655030128ec06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac1515570f1ce8bf3d1655030128ec06_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\ivxrnfklazjpv.exeC:\Windows\system32\ivxrnfklazjpv.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\azvklz.exeC:\Windows\system32\azvklz.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\ymbvjm.exeC:\Windows\system32\ymbvjm.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\tztgwjdvaseho.exeC:\Windows\system32\tztgwjdvaseho.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\tdda.exeC:\Windows\system32\tdda.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\ilzqgr.exeC:\Windows\system32\ilzqgr.exe7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\rtssmrwurb.exeC:\Windows\system32\rtssmrwurb.exe8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\ndjq.exeC:\Windows\system32\ndjq.exe9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\chothcn.exeC:\Windows\system32\chothcn.exe10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\nxmdwxh.exeC:\Windows\system32\nxmdwxh.exe11⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\ftjnlxyxeffy.exeC:\Windows\system32\ftjnlxyxeffy.exe12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\yeagqghkiumco.exeC:\Windows\system32\yeagqghkiumco.exe13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\wnye.exeC:\Windows\system32\wnye.exe14⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\vzzw.exeC:\Windows\system32\vzzw.exe15⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\yindcydngcz.exeC:\Windows\system32\yindcydngcz.exe16⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\fbyzwlmzlxwvm.exeC:\Windows\system32\fbyzwlmzlxwvm.exe17⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\tnpugclblu.exeC:\Windows\system32\tnpugclblu.exe18⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\qksk.exeC:\Windows\system32\qksk.exe19⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\ravowllmfvy.exeC:\Windows\system32\ravowllmfvy.exe20⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\ewjkaqakzgwhv.exeC:\Windows\system32\ewjkaqakzgwhv.exe21⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\lhtxndpnp.exeC:\Windows\system32\lhtxndpnp.exe22⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1040,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:81⤵PID:4864