Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe
-
Size
114KB
-
MD5
b11bd1bbecae6acac09e165095db0639
-
SHA1
1b01e15d5ebbe8e9a6df48d9ab61746fd876bb84
-
SHA256
f250724b391f3da1e71ffacb2bcdf03032f5e1f828f0280561e0ac15c03160d8
-
SHA512
3393fc3bc357a16aebf138cfaeb75f83aa0fa69fc71ca443d77fe423ea0e810b4bbf5788a19be8f3b4d081dbb706b242a41865c67d70460e20c62cc211a93124
-
SSDEEP
3072:5KBb1jGSXBQ5bc3uLTCwos555YjoqT0EFIb:i1jGSX8b/LTwsaoL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2556 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2556 2708 b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2556 2708 b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2556 2708 b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2556 2708 b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b11bd1bbecae6acac09e165095db0639_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Jkj..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD531fc392b41f1efd251993dbee4bf2a8a
SHA1fe006d319a47d0f84effaa7fa114f26f7a7e3c9b
SHA256c3cc4ed98f193ffd139466da7819ce1bf18e46b4198713c20b53f000f0827d5e
SHA5129797dd7202c3ac3541cea005b19ee75b20f93ed80ec6ff8975c39ef0b70c1011a6df876687947be1230c8c30562ce885b570b441d84472463798a08ab2a36f07