Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe
-
Size
34KB
-
MD5
b93c73b5398041f5bfd1e9c7cd55da1e
-
SHA1
350cb7ffb8da0c650b7efd0518a8dbcef5be2c7a
-
SHA256
62c5f7935b77d45778bb5a12a8db19dc330bc049d8672656287b73ca63964f99
-
SHA512
85b1bf1f31740e8e0335d72df20147e372085c017f25607ff7aa4ff412e15787be1c6496f7775f82f416bbd8ba694bc5f90bad22f3f55ba7974e1ff872890d3f
-
SSDEEP
768:0DXXMb9eT0uCqMblI4Os8FpP28MxHZRBvj8Oghoob:UA9eT0rRI4Os8zaHZ/gGy
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4448 wuaucldt.exe 3948 wuaucldt.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\wuaucldt.exe b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe File created \??\c:\windows\SysWOW64\wuaucldt.exe wuaucldt.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuaucldt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuaucldt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 980 wrote to memory of 4448 980 b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe 85 PID 980 wrote to memory of 4448 980 b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe 85 PID 980 wrote to memory of 4448 980 b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe 85 PID 4448 wrote to memory of 3948 4448 wuaucldt.exe 87 PID 4448 wrote to memory of 3948 4448 wuaucldt.exe 87 PID 4448 wrote to memory of 3948 4448 wuaucldt.exe 87 PID 980 wrote to memory of 1524 980 b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe 90 PID 980 wrote to memory of 1524 980 b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe 90 PID 980 wrote to memory of 1524 980 b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe 90 PID 4448 wrote to memory of 384 4448 wuaucldt.exe 92 PID 4448 wrote to memory of 384 4448 wuaucldt.exe 92 PID 4448 wrote to memory of 384 4448 wuaucldt.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b93c73b5398041f5bfd1e9c7cd55da1e_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
\??\c:\windows\SysWOW64\wuaucldt.exec:\windows\system32\wuaucldt.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
\??\c:\users\admin\wuaucldt.exec:\users\admin\wuaucldt.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del c:\windows\syswow64\wuaucldt.exe3⤵
- System Location Discovery: System Language Discovery
PID:384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del c:\users\admin\appdata\local\temp\B93C73~1.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5b93c73b5398041f5bfd1e9c7cd55da1e
SHA1350cb7ffb8da0c650b7efd0518a8dbcef5be2c7a
SHA25662c5f7935b77d45778bb5a12a8db19dc330bc049d8672656287b73ca63964f99
SHA51285b1bf1f31740e8e0335d72df20147e372085c017f25607ff7aa4ff412e15787be1c6496f7775f82f416bbd8ba694bc5f90bad22f3f55ba7974e1ff872890d3f