Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe
-
Size
50KB
-
MD5
ae14db66cd71b6ba57b07a509f9258da
-
SHA1
5fcedd3993f8e5004aa68067fe52b7e9b614ca0e
-
SHA256
029bab9aa5f01fe00cb221a516f1764e7f1b8e72d98208fcaa8750dd92bb2abd
-
SHA512
baf20614ffb33665ecf04514d47fb3eb009718bf41f4e2d9dc4261b7c4c53dea2a40b3a9f512b634cc77deea9663056228ea2fb9b10abce75ac932205a1e4261
-
SSDEEP
768:LepHpvCRuviPuvvaVeRMFhMN/L+9n53W+oof/Xox/FEA:qpHpvs5wvaVeR0aVL+qLuoP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2528 budha.exe -
Loads dropped DLL 1 IoCs
pid Process 2116 ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2528 2116 ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2528 2116 ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2528 2116 ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2528 2116 ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD577776b356b275759a4517fa8a9e468d8
SHA1a1b584755a0f77a023e5c716f44cadaca60ce19d
SHA256861903a77529c0f9ff109eb40bd1c9972e14f30ad23ea4386bcca5cdb60e7c99
SHA512296bb17b4b8952cdbea8f452fcdae5d9d0b9276ccaf518703f0b42874ccd4aaeae6184ad7222b02a80651ed5c52336a9a90a75cef3c21d0a65b80d2f182893f5