Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 02:47
Static task
static1
Behavioral task
behavioral1
Sample
c220fef924511a4dd6d8e35d4638d1d9_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c220fef924511a4dd6d8e35d4638d1d9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c220fef924511a4dd6d8e35d4638d1d9_JaffaCakes118.exe
-
Size
9KB
-
MD5
c220fef924511a4dd6d8e35d4638d1d9
-
SHA1
8e5d9c842875c476bb4db1dfc6ae1638d2f4a569
-
SHA256
10655dbd2fc21cbdf1ffa88d720569f76ab728a05c37f44c94db132d1ef37dc3
-
SHA512
f1c25786d1b6045543ed0c9b7a265e795176770afeb42698398def487eced23d5353a00c340db67ea973ced9ba6cfe7a02bf49c87ddb2c305b40542e5336021b
-
SSDEEP
48:SH2dz2LnN576/XmlVOeAqabhJFWN0E2uKpxibSeU7soR7lOdM:S7LnD6vAnohJLi+eU7soRiM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c220fef924511a4dd6d8e35d4638d1d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Runs .reg file with regedit 2 IoCs
pid Process 3700 regedit.exe 2768 regedit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3460 wrote to memory of 1560 3460 c220fef924511a4dd6d8e35d4638d1d9_JaffaCakes118.exe 85 PID 3460 wrote to memory of 1560 3460 c220fef924511a4dd6d8e35d4638d1d9_JaffaCakes118.exe 85 PID 3460 wrote to memory of 1560 3460 c220fef924511a4dd6d8e35d4638d1d9_JaffaCakes118.exe 85 PID 1560 wrote to memory of 3700 1560 cmd.exe 86 PID 1560 wrote to memory of 3700 1560 cmd.exe 86 PID 1560 wrote to memory of 3700 1560 cmd.exe 86 PID 1560 wrote to memory of 3112 1560 cmd.exe 87 PID 1560 wrote to memory of 3112 1560 cmd.exe 87 PID 1560 wrote to memory of 3112 1560 cmd.exe 87 PID 1560 wrote to memory of 5064 1560 cmd.exe 88 PID 1560 wrote to memory of 5064 1560 cmd.exe 88 PID 1560 wrote to memory of 5064 1560 cmd.exe 88 PID 1560 wrote to memory of 2768 1560 cmd.exe 89 PID 1560 wrote to memory of 2768 1560 cmd.exe 89 PID 1560 wrote to memory of 2768 1560 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c220fef924511a4dd6d8e35d4638d1d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c220fef924511a4dd6d8e35d4638d1d9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\240630156.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\regedit.exeregedit /s Set.reg3⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3700
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s shellex.dll3⤵
- System Location Discovery: System Language Discovery
PID:3112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ver3⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s 2k.reg3⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
634B
MD509c55e47083c7127c2238a4c988db80c
SHA1c9977fc6537c2974274702ba491d5c8a2578419a
SHA2566d48eda064a20b5915d4fbe8bccc5208098f9fe3729cc27bb22457c79743b4f1
SHA51239bb88459778f2dccaa662d9faa8c7c34e2ac38e1525cc3aa0c683f3684e7ad9475a1900e8a2849ac88fb9bf0f034239309b0a180f26ac21ad840457e6728f74