Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe
-
Size
385KB
-
MD5
baadac6ed9dda319a6e719f3f10f1586
-
SHA1
72e5bf153a847630970a7ff313763fc21ba0c09c
-
SHA256
487ec4b317f2f9b2e880e32d744902bfce90a8057ccfdfd21aecdacc280f82ad
-
SHA512
282a49c2b09e2c1175156f048203435e9b475e322e8020dc400194c858598264d0a4b5af265245a098c1f3201c56b03e95b2105b32ca379b69706bd696d7e719
-
SSDEEP
6144:WZ8wBfHF2idZecnl20lHRxp3gJ9+Ht3hn+BBVKUii9gdTyr26W6Yk3+i0MCUnu9a:WeG9F3Z4mxxa9+NReBlsTVxvk3ZIa
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 5068 3632 baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe 84 PID 3632 wrote to memory of 5068 3632 baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe 84 PID 3632 wrote to memory of 5068 3632 baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\baadac6ed9dda319a6e719f3f10f1586_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\wscript.exewscript.exe /B "C:\Users\Admin\AppData\Local\Temp\Gkey19521541.jse"2⤵
- System Location Discovery: System Language Discovery
PID:5068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD53dbd570be32baeab64bed1d7c70fbc60
SHA14fcd7b0bfc54f1e38b03793c8f14eea44b269c43
SHA2563b96f90c5393c3ef233531d12232e7b6dab08d829c08148e8ee0112a84e0e8d7
SHA5121749de499b638d70d43e634730f345283c2dc8cd427c0cf657e2197ed2ff9d4e00003a751f9f0b3ad1caa7cbe627f9103c1791f1f69582402375f7c6ffe32e4f