Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
bab181e92703a26d672661c95b5b079d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bab181e92703a26d672661c95b5b079d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bab181e92703a26d672661c95b5b079d_JaffaCakes118.exe
-
Size
110KB
-
MD5
bab181e92703a26d672661c95b5b079d
-
SHA1
fb05b3a3cf48e0e893eb5f3ce7d14b0fbbcdc2e8
-
SHA256
9cf193c3028f4b63f0c6aba13b4bd0b1376d993f950a02ca45e49e039d3be8be
-
SHA512
b3aa75af13acdae5855946ab1cb0ed5939f084fd5fbeb3c6cf21f5e503b6b7d63590a0c6e35c1915da7903a830a6410b8518bb0223b4799282eb3ef6ff23029e
-
SSDEEP
1536:jAFV9Xa0whvy+EOvaEgp9oqfo3BWHA9wpR4iVHuX3nb391TAUB7iYdaMxkYFIy:jAv9qJvAibqPHWOJunb39SIZdrFIy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bab181e92703a26d672661c95b5b079d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2744 2720 bab181e92703a26d672661c95b5b079d_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2744 2720 bab181e92703a26d672661c95b5b079d_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2744 2720 bab181e92703a26d672661c95b5b079d_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2744 2720 bab181e92703a26d672661c95b5b079d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bab181e92703a26d672661c95b5b079d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bab181e92703a26d672661c95b5b079d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Bbb..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD50a3122491d665afce6ded90d70a74b21
SHA1804182d75fb842f654f3cac783d0c92e896c8999
SHA2568fcb9f1e0aa1e3fd16c281217a4eb918f9c390bf1ad66446548f35f81293576e
SHA512c33dc77b62a92fa7a7c1b057f4a1c793387bb3a2b820a0ca9d50687eb0684912a93a0b893e7703a109822d6a5303b4d281044ee2e15a0ea0f3beda17dc3c8e0a