Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe
-
Size
32KB
-
MD5
bace57f91512f1f99a84473dd39c8b92
-
SHA1
5362a0fab6bae2eccdb201ab11f5b5a7eecf15ed
-
SHA256
eed93e27c90c3e0b9e3bc3f9d60f0e73bbb78d5498ed3bdbf4b6e987465f7bb4
-
SHA512
a4edc24e941b2ee403987a49fc5433d495726025358778a17cf0a40e9d2d4185dbdef633e3851a7a9580041c8d4ecbc229ae92c2937f2621df3a26081caab976
-
SSDEEP
384:wLMEC46m2dcbuGQh0A5Ztq54wt1VOZBqP6m2dcbuGQh0ABe:wLOBCbQh0A5ZtqfUZQSBCbQh0AI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2960 bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2276 2960 bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2276 2960 bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2276 2960 bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2276 2960 bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\TM.bat2⤵
- System Location Discovery: System Language Discovery
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD519636aed76ca2f4ac5395da32ab225c3
SHA1c2385505f628bd42bb40d15c0d5bf3cc691b3c44
SHA2565d415130fd1a7cfd34af7970d8046c7fbfe71c26d957da7fd32142c64f95b004
SHA5124115117af7605a4528be6eca3593cf797a37cd53f6ccd426cac6e1f530f8520fb10eb8f7b314093daa2e19e7b7f79180efcfb264284e23091e0482dd0f790927
-
Filesize
8.8MB
MD5b5c198d55c7bbaad41e41d8bbcea20ab
SHA12789b866df6a9fc34b3dc29ae09066dc21d51844
SHA256620b65a5fddb062dc45a6be7cc0af8a2873dd215b4a8a63a8ca347c6727bdcad
SHA5129ab269c1b531c25f3b9a4128b1b09e25d18a02709c5c6d14a1322dbf95051f7f8bf5074d6e9979e0967ae27387188d602bc605ff36a984460f2ad813a3af737e