Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
b7f609e36a099cc8278d05bbd7410ff7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b7f609e36a099cc8278d05bbd7410ff7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7f609e36a099cc8278d05bbd7410ff7_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
b7f609e36a099cc8278d05bbd7410ff7
-
SHA1
8c32b6ff7158e51ac4597bc7cf24d1bd99d8c49b
-
SHA256
f67f9534cc190449ede9f87cde7b20f76f8a3f784fc49912bdda838b744a9a58
-
SHA512
377eb89a38af3b7cd6d6f6f2705d3a71506c80ac1f2b0655fc82c07f37120150c494674e6f4d2e6f93ae4a67e93e57857bc92eb31e435f42e648c6988d6e9f83
-
SSDEEP
24576:l7uruQM3mEHaoQIjFZyxP4Hy2KXzfulZqBcAWks7BXC43NCnTsLG:l6kSDpBKBXlty
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2944 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7f609e36a099cc8278d05bbd7410ff7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2944 2292 b7f609e36a099cc8278d05bbd7410ff7_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2944 2292 b7f609e36a099cc8278d05bbd7410ff7_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2944 2292 b7f609e36a099cc8278d05bbd7410ff7_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2944 2292 b7f609e36a099cc8278d05bbd7410ff7_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7f609e36a099cc8278d05bbd7410ff7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7f609e36a099cc8278d05bbd7410ff7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c .\qelizresa1.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD5c0e7cd7ed0394afb420308594d840d56
SHA1dc133cd0858ac359f109831bc6726a4f6dd82c8b
SHA2564e23ded8af83d73053242db871f2651afabcc431e15fd8bdd8968fd32c550686
SHA5127feda2ecc6c96ff7e066096c9235054c711a05dd71f7383fbdbd7a1d51a4370bf93cc6b8b5e23c516cd4d2dafaaabdbf150667fb50fe2fb3ae0081fec92f28df