Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe
-
Size
3.3MB
-
MD5
c043a91bee18df1a8eac8f093adc194d
-
SHA1
977a9c687850fc25ee1fa314481e572c7e316f9c
-
SHA256
5a8bde02380b3a20e9340161499db1bd078ac10230652d45eeba441769f433dc
-
SHA512
3917ab8215eb1dd0d25a556e26daeed7715e136bd0a02a8924b7360e0d558b0777ced062daf7ab8b10a26fabb234f87d574e4d773e16a894f4911908be57acce
-
SSDEEP
49152:fHqPbvurw/c2UcF9O6hPn7UWN5f6hHryW6BHvJGo5qynybGkMz3Yu+md9YzZcn:fKPTsw09SdPAWN56hf695zyV3md9Yz6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2980 insthp.exe -
Loads dropped DLL 2 IoCs
pid Process 2980 insthp.exe 2980 insthp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language insthp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2980 2328 c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe 84 PID 2328 wrote to memory of 2980 2328 c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe 84 PID 2328 wrote to memory of 2980 2328 c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c043a91bee18df1a8eac8f093adc194d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\hp10.tmp\insthp.exeC:\Users\Admin\AppData\Local\Temp\hp10.tmp\insthp.exe C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5cfb22cf2f1d1bc13624da5595e8bc9be
SHA1d138910b4be09e9fbd8c76cc6596a41141973807
SHA256c4ee6e4a1b6da202b3fb08ad8190e2f8fea20a72471f2bd140631541d9797aa3
SHA5126d923897c65d0ba9e864a74a5994a34a36ab57bf85f954db3c7a9c1a8d2cf6961eb889002042d2c454298106aea53a884699f8ddf43db713335fc06632b5e7d2
-
Filesize
33KB
MD5e1de4237c142a93ea12116d15af10999
SHA12c0ccf3b6aa6695cc49e68f40a428f5b54d2ede3
SHA256188ac36db22b6dbbbcf735c75631d8415e99051ce09b3965234205f24a3c8295
SHA512e2a13286a6d4bcdd5020b86099bf8ccf2af074be81b11a9acd8d31628d910d9b839431109dbf3f8161f61ca5dcf42bcd3d602a7a3b4a2e4e7d5f715d2ca0c55b
-
Filesize
15KB
MD51cc1a533c46171ac37e9e1445a5bb6c2
SHA16011b53d8207c78b511a736174ff66b32e6d01ec
SHA2563c942bd91e9dc2347eb04a3f8aaa0dbc63d73cc60b1fbb515b61ee08a81392ff
SHA5126bc882839742526d9d3d4e3541ee05e988fb9ae881354686b7226f25836289137e11e2f7afd1df8bd53666c5e5f93ebbc14ec5e33a02d11b94a22cc7e913baf0
-
Filesize
813KB
MD5afcd02c6ae68b3ac23acbbcffcdc9334
SHA163428608241948f428d691b040fd2a613a92020a
SHA256742d20c839300e9349f91d46425b99c4471feec2c72d4c86f487ce31ab1456b1
SHA5126c92da35f98e34dd720736e0204741f88135f0391edf18cdaa9b8e4249e1d3c4b882c71f8de2500803e294358205e62f0b917559bfd0011e838182fd0d2ff7fb
-
Filesize
3.4MB
MD5c6ebdb6e9613925f9dd2916da209f467
SHA148c21f495364e82aeb896074fc8955a4e2fdb9c9
SHA256b793d664fdeb832ee566c635f3643e62269675de778cb2c86a36e5e35135cb2a
SHA512582fa3baef28a857c852aa0d7736cc25525107de6fff506bc0c72331309c7e8ad409d887e5d875f798c084fa6794d9820a4a4e6ed43a25ddbd10adf98e3f35c0
-
Filesize
1KB
MD52dafe71a348178731778459d7d846d30
SHA1b32d6a29caf4dd0f7cc6c88e6c7b69e3889a2557
SHA2563ee7c0f607de3e636bffcd81c54a493a9f4d912317868b83a1416e7c31e1c291
SHA512426c72c30c0b7d18e60a8064d4a4ad0a2358ae1fab43697b4ec6596282bd6867ebd85d8abe9f7ae1526818800d91fdb551a9c037c63decdc217b06ad11442b8a
-
Filesize
48KB
MD5dd4fe0e657a06933d1a68a5773699e56
SHA19e9f3f3deb113c7a1ad04aa670612c20b7f4f0d1
SHA256fc6d89413046e7277ff0104ee71c6ab28ab5001de2151d38cea7ab753309ed88
SHA5129b81cabf7b79c1051203c627d5d2b08ab9c811eccd6adb6774a17e1344281f43fbee51c984492f79c353a59649c3db37094cb615c3699a9a3e6ba52a8a228ee2
-
Filesize
172KB
MD5e35fce2e7552cf2f5e2ec75a1566da8c
SHA1485d24d900f76abafd3ef98ae7621b87b4c0aa8f
SHA2562a4163cc2e8ffae7a0371adeedad772da32c7bb3b0a239814b1e056a82a21f7d
SHA5123b5d3fbc0cb3cc21f4a9c1985138c2133eff68fe02b0dca19c498028d0814fe62066fdb3ba4a7498c8cfa3d1c85aa0a77d85a4f9e1b6fa4b00fdfdac5e25850d
-
Filesize
16KB
MD52547567bb40351f371210b0e308e9965
SHA14f2f231184d81b68c089426a7494e974cbef2fa7
SHA2569b4e417b0c6658b96bff90de1034595374190edd6d6aab72f84d941368637b5a
SHA512b6a7e52464a406c3e3465f01be6d4d1e6f9c87b4dc65cf5b61d3f9da6154975504b37612938fb440c8d8059f235beb3ba1d68779fffb8875b67fe37122061a2b
-
Filesize
851KB
MD57fcf04b976326e46271522d643221565
SHA1616bf5355d615c7ff5a2c4bd81fff5d48f4d75bb
SHA2563aef122511cbdf0cb82529b6e378916dd4bbd2a88fc1f617bd40b68e969969f0
SHA512d31c3b8fe11bd83928c47c8b8d651c44873534265d0f0dfb844742427b4828edccf8ad7e0ff5a721a6e81010a8ce354a130c0540bf583bc63d108f627b572089
-
Filesize
943KB
MD54a80119167f3fb650d908b5ed9d71344
SHA1e641e4a6bf9365a2c5883a3cf5ebddfbe2b6fe13
SHA256279e2a988ba15a09a57c8b61bc134d00e38c09355ae978b065c275717886b252
SHA5120ae8fc555ee1d869fa5dd6d003dc5169d9519210d7c669696cbb0ebe7053ce83d17310635383e892191a68b97c8e221fe5c7284318e512fa9f5ba39a54260fb0