Analysis
-
max time kernel
137s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe
-
Size
24KB
-
MD5
b2c56e5fa337aa5303e8fe10b39f2156
-
SHA1
de6a0d6cd32a32d166b856635d96c932bd3cdf42
-
SHA256
b4ac56d6c24de1c447de60c75f1db5dbb519033345470a96108ffb6a5b2fbe47
-
SHA512
3f29dc55cd6375c630e90a139bcc1818d5a290f89fdf90eb3ba0868c708b2145c5bb75389ca93eeabbb0091c01fff34847ff745f24cd2f1e0cccd553be11ea7c
-
SSDEEP
384:Nw7FUgWax5DJe1ZGIWuKMFoNetjMgVUPUxLJZ1jUjLXQVXs0Ndp7csBxW6H:wmgBAjMRUxLJXqXQ7p7ccxv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3556 wrote to memory of 4280 3556 b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe 84 PID 3556 wrote to memory of 4280 3556 b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe 84 PID 3556 wrote to memory of 4280 3556 b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe 84 PID 4280 wrote to memory of 920 4280 cmd.exe 85 PID 4280 wrote to memory of 920 4280 cmd.exe 85 PID 4280 wrote to memory of 920 4280 cmd.exe 85 PID 3556 wrote to memory of 1028 3556 b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe 86 PID 3556 wrote to memory of 1028 3556 b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe 86 PID 3556 wrote to memory of 1028 3556 b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2c56e5fa337aa5303e8fe10b39f2156_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode 6502⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\mode.commode 6503⤵
- System Location Discovery: System Language Discovery
PID:920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
- System Location Discovery: System Language Discovery
PID:1028
-