Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
bdb689d0efd4f049f9c29e81aa12eef7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdb689d0efd4f049f9c29e81aa12eef7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bdb689d0efd4f049f9c29e81aa12eef7_JaffaCakes118.exe
-
Size
352KB
-
MD5
bdb689d0efd4f049f9c29e81aa12eef7
-
SHA1
53350949486e386142a66de3c4216a63c76dd9d0
-
SHA256
9be7038e417dc9f1c65498be31e331a4e87d5402a82a5fecacef6cea3c3caeba
-
SHA512
e5d6402bb0e348a9269833d429a2e84633e1b671df56e7a2c6b6c9b43e3dcde087a9bebe4721f222cd5bb21e610000b7c11a1ac82f994b6bf813a2f247cd6f1e
-
SSDEEP
3072:Fz/92a98YQ19SeOglRGzus3L0eYYQ19qROLz/9PwCZ632kKVaiJ38yej:FL9IR3Ozqs3JYRXL99E3iaugj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5012 Loader_forqd311.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdb689d0efd4f049f9c29e81aa12eef7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader_forqd311.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 bdb689d0efd4f049f9c29e81aa12eef7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2256 wrote to memory of 5012 2256 bdb689d0efd4f049f9c29e81aa12eef7_JaffaCakes118.exe 84 PID 2256 wrote to memory of 5012 2256 bdb689d0efd4f049f9c29e81aa12eef7_JaffaCakes118.exe 84 PID 2256 wrote to memory of 5012 2256 bdb689d0efd4f049f9c29e81aa12eef7_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdb689d0efd4f049f9c29e81aa12eef7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bdb689d0efd4f049f9c29e81aa12eef7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Loader_forqd311.exe"C:\Users\Admin\AppData\Local\Temp\Loader_forqd311.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5f7a1ed6adcdcd53e9c15afd05d6ba22d
SHA131203081e03e0f8d76787d73139427036c871d6a
SHA2560b2e5f5607957f2a4bb6506e1c4f4ff0f343ebbd63864f8eee7e8686ad0cdb9f
SHA51228d7b0d65a3a6faeb6cd30abdafdc426097432694f997d680ddb8cb3c631d2d44972999b50e9d643150a02c751b7f1f1097ecf18597b7477708bd703f1dbe962