Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe
-
Size
158KB
-
MD5
c77264bf91108520590ee158fec6ded0
-
SHA1
1832a7bbc07b78f242d44aba0243e81530d3e943
-
SHA256
918f4252cc1b6b02e5a1d1b2943b5571b046a98dc81a0a0b226bb9dd9ee84af5
-
SHA512
cfa62f7b61c47b03a6b480573823f1d991e9112564791cb2a3f3372393dc7e7a44dcddc5375a0612d12adbb8bc74481b4ef9d865d8148ccacd25c2fc5200c5d1
-
SSDEEP
3072:nZ84xrcEPCz8A61PVrtPaZYeX6uDwSHNMooOuRYMY+3aXQQL/ouc4nu6:Z1rDqgZGY+6uMSHNJobR6+3aNbnu6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1784 Jnania.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe File created C:\Windows\Jnania.exe c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe File opened for modification C:\Windows\Jnania.exe c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Jnania.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Jnania.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnania.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main Jnania.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\International Jnania.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe 1784 Jnania.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4220 wrote to memory of 1784 4220 c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe 87 PID 4220 wrote to memory of 1784 4220 c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe 87 PID 4220 wrote to memory of 1784 4220 c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c77264bf91108520590ee158fec6ded0_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\Jnania.exeC:\Windows\Jnania.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD5c77264bf91108520590ee158fec6ded0
SHA11832a7bbc07b78f242d44aba0243e81530d3e943
SHA256918f4252cc1b6b02e5a1d1b2943b5571b046a98dc81a0a0b226bb9dd9ee84af5
SHA512cfa62f7b61c47b03a6b480573823f1d991e9112564791cb2a3f3372393dc7e7a44dcddc5375a0612d12adbb8bc74481b4ef9d865d8148ccacd25c2fc5200c5d1
-
Filesize
390B
MD580e4631d000c6292cb1573e4d621e487
SHA13338abda8dfc5770ab8fb98337e2e266409a4398
SHA256ebb49b7f92fb013523a0326a03d11f799e15988b3b5747727ad7dfce64eaf029
SHA5120d7649e0475cbfb243fb1a70efbe5cc811607d9a7249656b3bc55f756681ec9c45a885a46bfdfbfb0ee87b32bbda15473cf28c8b0a47439817d57f73b22deb09