Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 02:35
Static task
static1
Behavioral task
behavioral1
Sample
ba07ddddd64bc47d2c27b5b2174bebd5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba07ddddd64bc47d2c27b5b2174bebd5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba07ddddd64bc47d2c27b5b2174bebd5_JaffaCakes118.exe
-
Size
244KB
-
MD5
ba07ddddd64bc47d2c27b5b2174bebd5
-
SHA1
a3188af57c58b4b861aa90ab60ea5e6c920829ba
-
SHA256
48f649415e51440469b9d2f416f5295ff2eda301becd114f1574a10a8aabea83
-
SHA512
e8e18aedd1f984dee1df87dba8cc3d57d22d192396cf9bf476bd051f1fbef70a2975eec5b2cb566ac859f014a8bfbd4db6108586a6fcf67b7e76d4d51cf32c1c
-
SSDEEP
6144:mWZr9xMx6cwvYHKT04uYeUZyfMd6kWq8ymrf1BpgIc+Xpl2vi:mkr3BcwUKg4uGwUpYXppc+l2vi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mhfbocqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xzfdpbfnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba07ddddd64bc47d2c27b5b2174bebd5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nshngkegz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vgjqaemkdwzv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvvuqppkuma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffpit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jgfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ixnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njpbixe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkkbsin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvbjkxfzcjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzhlcihu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ordr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvcdqvnjhno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkpfpkiebx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmslokrdbqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pymbfi.exe -
Suspicious behavior: RenamesItself 17 IoCs
pid Process 944 ba07ddddd64bc47d2c27b5b2174bebd5_JaffaCakes118.exe 1464 ixnh.exe 3156 njpbixe.exe 540 dkkbsin.exe 4448 mhfbocqh.exe 1520 nshngkegz.exe 3632 dvbjkxfzcjo.exe 864 uzhlcihu.exe 3928 vgjqaemkdwzv.exe 2616 ordr.exe 4760 djvvuqppkuma.exe 812 xzfdpbfnj.exe 1364 pvcdqvnjhno.exe 2140 ffpit.exe 2624 kkpfpkiebx.exe 3464 rmslokrdbqi.exe 764 jgfv.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 944 wrote to memory of 1464 944 ba07ddddd64bc47d2c27b5b2174bebd5_JaffaCakes118.exe 95 PID 944 wrote to memory of 1464 944 ba07ddddd64bc47d2c27b5b2174bebd5_JaffaCakes118.exe 95 PID 944 wrote to memory of 1464 944 ba07ddddd64bc47d2c27b5b2174bebd5_JaffaCakes118.exe 95 PID 1464 wrote to memory of 3156 1464 ixnh.exe 98 PID 1464 wrote to memory of 3156 1464 ixnh.exe 98 PID 1464 wrote to memory of 3156 1464 ixnh.exe 98 PID 3156 wrote to memory of 540 3156 njpbixe.exe 99 PID 3156 wrote to memory of 540 3156 njpbixe.exe 99 PID 3156 wrote to memory of 540 3156 njpbixe.exe 99 PID 540 wrote to memory of 4448 540 dkkbsin.exe 105 PID 540 wrote to memory of 4448 540 dkkbsin.exe 105 PID 540 wrote to memory of 4448 540 dkkbsin.exe 105 PID 4448 wrote to memory of 1520 4448 mhfbocqh.exe 106 PID 4448 wrote to memory of 1520 4448 mhfbocqh.exe 106 PID 4448 wrote to memory of 1520 4448 mhfbocqh.exe 106 PID 1520 wrote to memory of 3632 1520 nshngkegz.exe 107 PID 1520 wrote to memory of 3632 1520 nshngkegz.exe 107 PID 1520 wrote to memory of 3632 1520 nshngkegz.exe 107 PID 3632 wrote to memory of 864 3632 dvbjkxfzcjo.exe 108 PID 3632 wrote to memory of 864 3632 dvbjkxfzcjo.exe 108 PID 3632 wrote to memory of 864 3632 dvbjkxfzcjo.exe 108 PID 864 wrote to memory of 3928 864 uzhlcihu.exe 110 PID 864 wrote to memory of 3928 864 uzhlcihu.exe 110 PID 864 wrote to memory of 3928 864 uzhlcihu.exe 110 PID 3928 wrote to memory of 2616 3928 vgjqaemkdwzv.exe 111 PID 3928 wrote to memory of 2616 3928 vgjqaemkdwzv.exe 111 PID 3928 wrote to memory of 2616 3928 vgjqaemkdwzv.exe 111 PID 2616 wrote to memory of 4760 2616 ordr.exe 112 PID 2616 wrote to memory of 4760 2616 ordr.exe 112 PID 2616 wrote to memory of 4760 2616 ordr.exe 112 PID 4760 wrote to memory of 812 4760 djvvuqppkuma.exe 113 PID 4760 wrote to memory of 812 4760 djvvuqppkuma.exe 113 PID 4760 wrote to memory of 812 4760 djvvuqppkuma.exe 113 PID 812 wrote to memory of 1364 812 xzfdpbfnj.exe 122 PID 812 wrote to memory of 1364 812 xzfdpbfnj.exe 122 PID 812 wrote to memory of 1364 812 xzfdpbfnj.exe 122 PID 1364 wrote to memory of 2140 1364 pvcdqvnjhno.exe 123 PID 1364 wrote to memory of 2140 1364 pvcdqvnjhno.exe 123 PID 1364 wrote to memory of 2140 1364 pvcdqvnjhno.exe 123 PID 2140 wrote to memory of 2624 2140 ffpit.exe 124 PID 2140 wrote to memory of 2624 2140 ffpit.exe 124 PID 2140 wrote to memory of 2624 2140 ffpit.exe 124 PID 2624 wrote to memory of 3464 2624 kkpfpkiebx.exe 125 PID 2624 wrote to memory of 3464 2624 kkpfpkiebx.exe 125 PID 2624 wrote to memory of 3464 2624 kkpfpkiebx.exe 125 PID 3464 wrote to memory of 764 3464 rmslokrdbqi.exe 128 PID 3464 wrote to memory of 764 3464 rmslokrdbqi.exe 128 PID 3464 wrote to memory of 764 3464 rmslokrdbqi.exe 128 PID 764 wrote to memory of 2080 764 jgfv.exe 129 PID 764 wrote to memory of 2080 764 jgfv.exe 129 PID 764 wrote to memory of 2080 764 jgfv.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba07ddddd64bc47d2c27b5b2174bebd5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba07ddddd64bc47d2c27b5b2174bebd5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\ixnh.exeC:\Windows\system32\ixnh.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\njpbixe.exeC:\Windows\system32\njpbixe.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\dkkbsin.exeC:\Windows\system32\dkkbsin.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\mhfbocqh.exeC:\Windows\system32\mhfbocqh.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\nshngkegz.exeC:\Windows\system32\nshngkegz.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\dvbjkxfzcjo.exeC:\Windows\system32\dvbjkxfzcjo.exe7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\uzhlcihu.exeC:\Windows\system32\uzhlcihu.exe8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\vgjqaemkdwzv.exeC:\Windows\system32\vgjqaemkdwzv.exe9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\ordr.exeC:\Windows\system32\ordr.exe10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\djvvuqppkuma.exeC:\Windows\system32\djvvuqppkuma.exe11⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\xzfdpbfnj.exeC:\Windows\system32\xzfdpbfnj.exe12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\pvcdqvnjhno.exeC:\Windows\system32\pvcdqvnjhno.exe13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\ffpit.exeC:\Windows\system32\ffpit.exe14⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\kkpfpkiebx.exeC:\Windows\system32\kkpfpkiebx.exe15⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\rmslokrdbqi.exeC:\Windows\system32\rmslokrdbqi.exe16⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\jgfv.exeC:\Windows\system32\jgfv.exe17⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\pymbfi.exeC:\Windows\system32\pymbfi.exe18⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-