Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe
-
Size
140KB
-
MD5
ac747b705909a21cdb864262d09c4f68
-
SHA1
013a20e9582575fc2a26b96a4f2c65ae3077e5d9
-
SHA256
e1aed6369432a12c0cc4418c3268a64f0df8bc694a3deabf4d551db5796835ea
-
SHA512
7e66016a5896bce4119c5ae954fa3854f3ef5a8820e818081f6a6c5b5ff0c3db4cd105236661b3e7a7e487a54773010729176ed7a5c970fc8dbbbe65ec707690
-
SSDEEP
3072:VCrYGiFA2YdJN5MSypLAtEqu6qFIWBJXI+ADd2gT//v:3G92sfMPaE2IODAC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1300 2296 ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe 30 PID 2296 wrote to memory of 1300 2296 ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe 30 PID 2296 wrote to memory of 1300 2296 ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe 30 PID 2296 wrote to memory of 1300 2296 ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe 30 PID 1300 wrote to memory of 1344 1300 net.exe 32 PID 1300 wrote to memory of 1344 1300 net.exe 32 PID 1300 wrote to memory of 1344 1300 net.exe 32 PID 1300 wrote to memory of 1344 1300 net.exe 32 PID 2296 wrote to memory of 2244 2296 ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe 33 PID 2296 wrote to memory of 2244 2296 ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe 33 PID 2296 wrote to memory of 2244 2296 ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe 33 PID 2296 wrote to memory of 2244 2296 ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe 33 PID 2244 wrote to memory of 2788 2244 net.exe 35 PID 2244 wrote to memory of 2788 2244 net.exe 35 PID 2244 wrote to memory of 2788 2244 net.exe 35 PID 2244 wrote to memory of 2788 2244 net.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac747b705909a21cdb864262d09c4f68_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\net.exenet stop wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-