Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe
-
Size
385KB
-
MD5
baadac6ed9dda319a6e719f3f10f1586
-
SHA1
72e5bf153a847630970a7ff313763fc21ba0c09c
-
SHA256
487ec4b317f2f9b2e880e32d744902bfce90a8057ccfdfd21aecdacc280f82ad
-
SHA512
282a49c2b09e2c1175156f048203435e9b475e322e8020dc400194c858598264d0a4b5af265245a098c1f3201c56b03e95b2105b32ca379b69706bd696d7e719
-
SSDEEP
6144:WZ8wBfHF2idZecnl20lHRxp3gJ9+Ht3hn+BBVKUii9gdTyr26W6Yk3+i0MCUnu9a:WeG9F3Z4mxxa9+NReBlsTVxvk3ZIa
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2848 3036 baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2848 3036 baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2848 3036 baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2848 3036 baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\wscript.exewscript.exe /B "C:\Users\Admin\AppData\Local\Temp\Gkey19521541.jse"2⤵
- System Location Discovery: System Language Discovery
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD53dbd570be32baeab64bed1d7c70fbc60
SHA14fcd7b0bfc54f1e38b03793c8f14eea44b269c43
SHA2563b96f90c5393c3ef233531d12232e7b6dab08d829c08148e8ee0112a84e0e8d7
SHA5121749de499b638d70d43e634730f345283c2dc8cd427c0cf657e2197ed2ff9d4e00003a751f9f0b3ad1caa7cbe627f9103c1791f1f69582402375f7c6ffe32e4f