Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 10:30
Behavioral task
behavioral1
Sample
b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe
-
Size
106KB
-
MD5
b31c701b9679ce8895eac526ed97ec49
-
SHA1
aa208d039b362b9536944013158f19d651393a5a
-
SHA256
cb9aafa72b611be752cd750062c6f0bd23360d263a150b2de14dc617ff71002d
-
SHA512
4cf4ef6ffa789dccd276ca9fffef8d36b5158b41d3389dab0f7309ce48ef1c0b2a28d4d5e7d1c1fa8d6b3844666eeb90434a11dc7dbad470bfbecc83e838862f
-
SSDEEP
3072:MeCe2KhWglJDS2a6pPe3QlstLSPim7MUMqkktpkxvV:imNk6VVJPPXpd7At
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4908 apocalyps32.exe -
resource yara_rule behavioral2/memory/4512-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023480-3.dat upx behavioral2/memory/4512-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4908-7-0x0000000040010000-0x000000004004C000-memory.dmp upx behavioral2/memory/4908-11-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe File opened for modification C:\Windows\apocalyps32.exe b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 4908 4512 b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe 84 PID 4512 wrote to memory of 4908 4512 b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe 84 PID 4512 wrote to memory of 4908 4512 b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe 84 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85 PID 4908 wrote to memory of 3784 4908 apocalyps32.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b31c701b9679ce8895eac526ed97ec49_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\apocalyps32.exe-bs2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5b31c701b9679ce8895eac526ed97ec49
SHA1aa208d039b362b9536944013158f19d651393a5a
SHA256cb9aafa72b611be752cd750062c6f0bd23360d263a150b2de14dc617ff71002d
SHA5124cf4ef6ffa789dccd276ca9fffef8d36b5158b41d3389dab0f7309ce48ef1c0b2a28d4d5e7d1c1fa8d6b3844666eeb90434a11dc7dbad470bfbecc83e838862f