Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 16:29
Static task
static1
Behavioral task
behavioral1
Sample
beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
beff25fe68b167cc5e82983c480829a8
-
SHA1
d9e29bbea848ab046d983c57a2982c26a79faf00
-
SHA256
c589c5c31d4da03489af9ad2736e0695f2b7fa266faaad8048ead23e6a05a996
-
SHA512
4ce78bc91d3cac3a5261bc6ad6fc08220208a0bc0e8e0d8f3f0fb5f8bfb6dbcce71ba5c95890f588103446d0e45eb01d6b63b693a802d1a6e53763e8c6c64911
-
SSDEEP
49152:Qoa1taC070d+ZOjJzxacwnAEDiUXO53YL75+Lf99Z:Qoa1taC0FZONzc/nAE+U+5W75+799Z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3048 CEF3.tmp -
Executes dropped EXE 1 IoCs
pid Process 3048 CEF3.tmp -
Loads dropped DLL 1 IoCs
pid Process 2420 beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEF3.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3048 2420 beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3048 2420 beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3048 2420 beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3048 2420 beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\CEF3.tmp"C:\Users\Admin\AppData\Local\Temp\CEF3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\beff25fe68b167cc5e82983c480829a8_JaffaCakes118.exe 9CC48E0CE57A5969F68C0A41F95D36CEDDCDCD2D24D7712B1DCD96DF2695BE14EDECBA040CB97A1736A5D4F80938E757B2A68B1271E6611A1AD460E84C96D8E12⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD542e99fe10d633d1e69fa3f41fa27a6b7
SHA1d7fd92eefc726443601e422fdaca721944978d5b
SHA256a7d02c303c1dcceda73bef7ab58bf214895d9dd40bd4c8f0e079d5e6c973d06d
SHA512ba121bb98c9dd083ad87e4a29adf72b8ec651a085e9ddd336c584a968dfaae0502fbbaee56ce1f41d86b9b8ad9b1fece7ab3ecad30ffa19496bc32507d3b1425