Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 21:39
Static task
static1
Behavioral task
behavioral1
Sample
c1a45b4c964f86f8242efc7256aedcb5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1a45b4c964f86f8242efc7256aedcb5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c1a45b4c964f86f8242efc7256aedcb5_JaffaCakes118.exe
-
Size
160KB
-
MD5
c1a45b4c964f86f8242efc7256aedcb5
-
SHA1
4a89044a3c3a4275382e9fbfc1663bf8f730aed7
-
SHA256
e37d5647c8604a1b4fcac1e83ec9f03a94f9ab33329b8fb4c1501845c3efb89b
-
SHA512
a5cb19fb85fe5a7a3b062d5d51a965c6a1298d608f344640b9a3db12a3dbfea78bf3f5aaa8b372437d926c488bb8c9d4828718f67d64cf8dfae5de13562c3b42
-
SSDEEP
3072:zpV0REdInghTCDcreiXjPBkmy1cDspoYjJGoLoRJ:zp2RJghWDwdPBkF1cIpHQRJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srzbvyrabfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vipsdmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kqcmgnhfruxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpucb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osvrljcms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdsyiqkxzaevb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elrvtzhbfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amqwlcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ocsdxtpalo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zrniqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xijmzlzxbsfaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1a45b4c964f86f8242efc7256aedcb5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kmunsxhkugql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ayrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gidubqmioa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qcftcrzgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vywh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sttymi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phhjznfey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pmgqdtzsxid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxexa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxxm.exe -
Suspicious behavior: RenamesItself 22 IoCs
pid Process 3404 c1a45b4c964f86f8242efc7256aedcb5_JaffaCakes118.exe 1308 amqwlcl.exe 4524 srzbvyrabfn.exe 3984 kmunsxhkugql.exe 3116 ocsdxtpalo.exe 1000 vipsdmd.exe 716 pmgqdtzsxid.exe 4916 dxexa.exe 2940 ayrl.exe 1276 gidubqmioa.exe 4476 kqcmgnhfruxi.exe 3148 qrjv.exe 3604 hpucb.exe 3664 zrniqo.exe 3292 osvrljcms.exe 4060 mdsyiqkxzaevb.exe 5088 xijmzlzxbsfaf.exe 3224 qcftcrzgk.exe 4820 elrvtzhbfe.exe 4376 dxxm.exe 1272 vywh.exe 4920 sttymi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3404 wrote to memory of 1308 3404 c1a45b4c964f86f8242efc7256aedcb5_JaffaCakes118.exe 91 PID 3404 wrote to memory of 1308 3404 c1a45b4c964f86f8242efc7256aedcb5_JaffaCakes118.exe 91 PID 3404 wrote to memory of 1308 3404 c1a45b4c964f86f8242efc7256aedcb5_JaffaCakes118.exe 91 PID 1308 wrote to memory of 4524 1308 amqwlcl.exe 95 PID 1308 wrote to memory of 4524 1308 amqwlcl.exe 95 PID 1308 wrote to memory of 4524 1308 amqwlcl.exe 95 PID 4524 wrote to memory of 3984 4524 srzbvyrabfn.exe 96 PID 4524 wrote to memory of 3984 4524 srzbvyrabfn.exe 96 PID 4524 wrote to memory of 3984 4524 srzbvyrabfn.exe 96 PID 3984 wrote to memory of 3116 3984 kmunsxhkugql.exe 97 PID 3984 wrote to memory of 3116 3984 kmunsxhkugql.exe 97 PID 3984 wrote to memory of 3116 3984 kmunsxhkugql.exe 97 PID 3116 wrote to memory of 1000 3116 ocsdxtpalo.exe 100 PID 3116 wrote to memory of 1000 3116 ocsdxtpalo.exe 100 PID 3116 wrote to memory of 1000 3116 ocsdxtpalo.exe 100 PID 1000 wrote to memory of 716 1000 vipsdmd.exe 102 PID 1000 wrote to memory of 716 1000 vipsdmd.exe 102 PID 1000 wrote to memory of 716 1000 vipsdmd.exe 102 PID 716 wrote to memory of 4916 716 pmgqdtzsxid.exe 103 PID 716 wrote to memory of 4916 716 pmgqdtzsxid.exe 103 PID 716 wrote to memory of 4916 716 pmgqdtzsxid.exe 103 PID 4916 wrote to memory of 2940 4916 dxexa.exe 104 PID 4916 wrote to memory of 2940 4916 dxexa.exe 104 PID 4916 wrote to memory of 2940 4916 dxexa.exe 104 PID 2940 wrote to memory of 1276 2940 ayrl.exe 105 PID 2940 wrote to memory of 1276 2940 ayrl.exe 105 PID 2940 wrote to memory of 1276 2940 ayrl.exe 105 PID 1276 wrote to memory of 4476 1276 gidubqmioa.exe 108 PID 1276 wrote to memory of 4476 1276 gidubqmioa.exe 108 PID 1276 wrote to memory of 4476 1276 gidubqmioa.exe 108 PID 4476 wrote to memory of 3148 4476 kqcmgnhfruxi.exe 109 PID 4476 wrote to memory of 3148 4476 kqcmgnhfruxi.exe 109 PID 4476 wrote to memory of 3148 4476 kqcmgnhfruxi.exe 109 PID 3148 wrote to memory of 3604 3148 qrjv.exe 110 PID 3148 wrote to memory of 3604 3148 qrjv.exe 110 PID 3148 wrote to memory of 3604 3148 qrjv.exe 110 PID 3604 wrote to memory of 3664 3604 hpucb.exe 111 PID 3604 wrote to memory of 3664 3604 hpucb.exe 111 PID 3604 wrote to memory of 3664 3604 hpucb.exe 111 PID 3664 wrote to memory of 3292 3664 zrniqo.exe 112 PID 3664 wrote to memory of 3292 3664 zrniqo.exe 112 PID 3664 wrote to memory of 3292 3664 zrniqo.exe 112 PID 3292 wrote to memory of 4060 3292 osvrljcms.exe 120 PID 3292 wrote to memory of 4060 3292 osvrljcms.exe 120 PID 3292 wrote to memory of 4060 3292 osvrljcms.exe 120 PID 4060 wrote to memory of 5088 4060 mdsyiqkxzaevb.exe 121 PID 4060 wrote to memory of 5088 4060 mdsyiqkxzaevb.exe 121 PID 4060 wrote to memory of 5088 4060 mdsyiqkxzaevb.exe 121 PID 5088 wrote to memory of 3224 5088 xijmzlzxbsfaf.exe 122 PID 5088 wrote to memory of 3224 5088 xijmzlzxbsfaf.exe 122 PID 5088 wrote to memory of 3224 5088 xijmzlzxbsfaf.exe 122 PID 3224 wrote to memory of 4820 3224 qcftcrzgk.exe 123 PID 3224 wrote to memory of 4820 3224 qcftcrzgk.exe 123 PID 3224 wrote to memory of 4820 3224 qcftcrzgk.exe 123 PID 4820 wrote to memory of 4376 4820 elrvtzhbfe.exe 124 PID 4820 wrote to memory of 4376 4820 elrvtzhbfe.exe 124 PID 4820 wrote to memory of 4376 4820 elrvtzhbfe.exe 124 PID 4376 wrote to memory of 1272 4376 dxxm.exe 128 PID 4376 wrote to memory of 1272 4376 dxxm.exe 128 PID 4376 wrote to memory of 1272 4376 dxxm.exe 128 PID 1272 wrote to memory of 4920 1272 vywh.exe 129 PID 1272 wrote to memory of 4920 1272 vywh.exe 129 PID 1272 wrote to memory of 4920 1272 vywh.exe 129 PID 4920 wrote to memory of 4316 4920 sttymi.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a45b4c964f86f8242efc7256aedcb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1a45b4c964f86f8242efc7256aedcb5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\amqwlcl.exeC:\Windows\system32\amqwlcl.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\srzbvyrabfn.exeC:\Windows\system32\srzbvyrabfn.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\kmunsxhkugql.exeC:\Windows\system32\kmunsxhkugql.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\ocsdxtpalo.exeC:\Windows\system32\ocsdxtpalo.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\vipsdmd.exeC:\Windows\system32\vipsdmd.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\pmgqdtzsxid.exeC:\Windows\system32\pmgqdtzsxid.exe7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\dxexa.exeC:\Windows\system32\dxexa.exe8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\ayrl.exeC:\Windows\system32\ayrl.exe9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\gidubqmioa.exeC:\Windows\system32\gidubqmioa.exe10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\kqcmgnhfruxi.exeC:\Windows\system32\kqcmgnhfruxi.exe11⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\qrjv.exeC:\Windows\system32\qrjv.exe12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\hpucb.exeC:\Windows\system32\hpucb.exe13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\zrniqo.exeC:\Windows\system32\zrniqo.exe14⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\osvrljcms.exeC:\Windows\system32\osvrljcms.exe15⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\mdsyiqkxzaevb.exeC:\Windows\system32\mdsyiqkxzaevb.exe16⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\xijmzlzxbsfaf.exeC:\Windows\system32\xijmzlzxbsfaf.exe17⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\qcftcrzgk.exeC:\Windows\system32\qcftcrzgk.exe18⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\elrvtzhbfe.exeC:\Windows\system32\elrvtzhbfe.exe19⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\dxxm.exeC:\Windows\system32\dxxm.exe20⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\vywh.exeC:\Windows\system32\vywh.exe21⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\sttymi.exeC:\Windows\system32\sttymi.exe22⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\phhjznfey.exeC:\Windows\system32\phhjznfey.exe23⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-