Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 18:44
Behavioral task
behavioral1
Sample
ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe
-
Size
926KB
-
MD5
ac24f06fdf5a5e7ed478418597a2d5cb
-
SHA1
d5723c93d9f65354cdf9764acd9db24107e1143a
-
SHA256
643d6b1cba1081fa333d4e667fd52f920a8dbe6a1d817744bdc4ee39ebab99a5
-
SHA512
cfe04ba4a12a295e0f1fc560bf0db82ba856c3fad40a8b4c4cd5a5601be58ba3a94e46e04f40d2f26b99d44b722b30f4a623f09d7a7d3d251b15e0170b5d72e6
-
SSDEEP
24576:khq0hpEG0w9kDzALzbr5/MGYkDOHM9rflhJ+1kX:SK8yDAvh7YkiM9rp+1G
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4896-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4896-24-0x0000000000400000-0x0000000000420000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4896 ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe 4896 ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4896 wrote to memory of 724 4896 ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe 93 PID 4896 wrote to memory of 724 4896 ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe 93 PID 4896 wrote to memory of 724 4896 ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe 93 PID 724 wrote to memory of 3536 724 cmd.exe 95 PID 724 wrote to memory of 3536 724 cmd.exe 95 PID 724 wrote to memory of 3536 724 cmd.exe 95 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3536 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\SastikDelete.bat "C:\Users\Admin\AppData\Local\Temp\ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\attrib.exeattrib -S -H "C:\Users\Admin\AppData\Local\Temp\ac24f06fdf5a5e7ed478418597a2d5cb_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD5fde1e0bed53bf0b390feb49994053ebd
SHA11851270c437e97a21bd78cfb65f67c67f517e381
SHA256e35592b76193c5483ab2bfd14b73e062b907512bb0b99fdac7030f37b7341745
SHA51248fccfeb4454f803accfd02df260188cdd9a371fe44274a4dbb535bc8616276d02c5b8eff3ed8fa5c36b8347f97992df68e5add6c9b1749bb6d6611786541fae