Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 15:15
Behavioral task
behavioral1
Sample
afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe
-
Size
133KB
-
MD5
afbdea8be86ccde6365d03e7ee95f125
-
SHA1
5ba607a3fddccb196acac4976036ed4ace3d9004
-
SHA256
624d14e3f8187666e491439ade070b2dc3e34f54d27dffc3392593429fb757d6
-
SHA512
5a93b51938aa7154c2e76c07fe4bab8bcad41f9b6585dff75832dada1f534488c3a08d6ff98e45ae837303b25f1941190c4e88337e9a6f00c4f9615d52f905fe
-
SSDEEP
3072:I+YoEQtPmEHXBNOwYPjJvXlNdLs2C9JFFBat+fMMBSQ:LEiPwhjJtNdZGxNk2SQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1412 afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1412 afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2424-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/1412-14-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/files/0x00090000000233f6-12.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2424 afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2424 afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe 1412 afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1412 2424 afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe 85 PID 2424 wrote to memory of 1412 2424 afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe 85 PID 2424 wrote to memory of 1412 2424 afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\afbdea8be86ccde6365d03e7ee95f125_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD58a9a9b106c3a7db80be5e0c4c9815ed9
SHA17bdba7678d32ca068144b8bb41e336e5ed9a0cea
SHA25688280a65c548ab59f8ba438daaf0dddee688a3a289edf2b96f2f736f381247f4
SHA512eded308d5a625fc2b5ea51cfc99f6d0602c07abb1f9cec899725a3ed962114e87589ea35cb65fa423991e8e572cdbebe323a9915d5dde16cf2ea5fba802309c4