Analysis
-
max time kernel
141s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe
-
Size
530KB
-
MD5
bc955fe35a6a4e850c3cefaf160809b9
-
SHA1
0237e2021699ef2e1871c64494310db79689ca6f
-
SHA256
84405200bc407218b6cc9313a7591eba8a3653629043550bab9d82321728a565
-
SHA512
1ca933f2070dc4e56d73964363b7d552c652339716b079985e97778fa2a42a55ebf808ed81f16aaafb9babd2bd58d818b7a660a4e04394561acf619212d99f87
-
SSDEEP
12288:55QPTJvuVhV2vVc1pJPBO7Pc5wjhubpWQiHc/oM5ebMeCNG0NtTirdJ:552TU3V2vVc1XP8lj1Qi8/k1CNPTEdJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3940 AdobeSFX.log -
Program crash 1 IoCs
pid pid_target Process procid_target 2752 3940 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeSFX.log -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4776 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe 4776 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe 4776 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe 4776 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4776 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3372 wrote to memory of 4776 3372 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe 93 PID 3372 wrote to memory of 4776 3372 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe 93 PID 3372 wrote to memory of 4776 3372 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe 93 PID 4776 wrote to memory of 3940 4776 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe 94 PID 4776 wrote to memory of 3940 4776 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe 94 PID 4776 wrote to memory of 3940 4776 bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\AdobeSFX.logC:\Users\Admin\AppData\Local\Temp\\AdobeSFX.log3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 5204⤵
- Program crash
PID:2752
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3940 -ip 39401⤵PID:3664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:81⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
879KB
MD54fb2e76328c3b7514dc479893537667d
SHA13c3edad82d14a0dd4aa8ebb9a97f19194fd82519
SHA256436bfa7c3d703f55336f0c2304597047e8af3e60fe1e8b00b66df46ff402a753
SHA512a2a6fe2fe54cc1bf6892f3f7b639ceb4ea5ba1dfd57994ddeba254995cdbb928e815cb3e1257ac0a06a0b43c0f33a2d9225e4c4176424ea21856ba88c523c913