Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
c81457e5522039256fbd63363690c446_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c81457e5522039256fbd63363690c446_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c81457e5522039256fbd63363690c446_JaffaCakes118.exe
-
Size
701KB
-
MD5
c81457e5522039256fbd63363690c446
-
SHA1
b2234e206760c785750549a4e38d1abe6d80590f
-
SHA256
23b9c08eb5319da88ed19ae3ef5f23e7fac967022ae946d4af258c9b22bb2eb6
-
SHA512
967866b14d48bcc1cf75f862fa4974530d715631888c0fa152fbe7af1c4cb745a7aa4e3894baf9760add9d37dd5011de226e84b750ebd214fcba6fd3f7efe26e
-
SSDEEP
12288:2fFaMsYnqnIig/Aszzh+9YXXEVa3RlnlGzqWKllFhe4SnUGzSjJ1W4X:2fFhsCzzhpXEVaEqe4SnUG2x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2084 c81457e5522039256fbd63363690c446_JaffaCakes118.tmp -
Loads dropped DLL 1 IoCs
pid Process 1496 c81457e5522039256fbd63363690c446_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c81457e5522039256fbd63363690c446_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c81457e5522039256fbd63363690c446_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2084 1496 c81457e5522039256fbd63363690c446_JaffaCakes118.exe 30 PID 1496 wrote to memory of 2084 1496 c81457e5522039256fbd63363690c446_JaffaCakes118.exe 30 PID 1496 wrote to memory of 2084 1496 c81457e5522039256fbd63363690c446_JaffaCakes118.exe 30 PID 1496 wrote to memory of 2084 1496 c81457e5522039256fbd63363690c446_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c81457e5522039256fbd63363690c446_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c81457e5522039256fbd63363690c446_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\is-JV86C.tmp\c81457e5522039256fbd63363690c446_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-JV86C.tmp\c81457e5522039256fbd63363690c446_JaffaCakes118.tmp" /SL5="$50152,683146,83968,C:\Users\Admin\AppData\Local\Temp\c81457e5522039256fbd63363690c446_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5e6ebd955ad87e9894e6c187a9c886363
SHA1e39e4fc636471dbdaa9874a0e4b2fa10955a0ea4
SHA2561bc360592fbb2e21c3349a8c8b0ac3e404cab29c4ce8c745e9b7031eed4cee1b
SHA5124a172cf021325bbe267220b861baad519a8835603e46cb25da0187415005b4cd0ff8083133e56f6d2ab256ea1243797a012274dab73fd4331dced182cbc97457