Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2024, 19:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe
Resource
win7-20240704-en
8 signatures
150 seconds
General
-
Target
cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe
-
Size
244KB
-
MD5
cb81d969ca178f002523f835cc9a7b2b
-
SHA1
a5b5fb5ba662684b85e4cb0398acfbb995ab4821
-
SHA256
db660cd99f21d116375121be061ccbfecade73858541ba04c9657fa790de497b
-
SHA512
1e65517989dfb8985e3883a06dd87ceda11d2826b9eee2f6a9d6a2db53d399d178248973a74b77f7f431eaa40a381b01a464923b4a4ea9d5827ea4e6d6849a6b
-
SSDEEP
6144:5YBFB8Ec+BwveeRq2+FWx6pNv8AQxJMV:yBFB0RT+FxpSAQW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language withoutwcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language withoutwcs.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2724 cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe 2724 cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe 920 cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe 920 cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe 2904 withoutwcs.exe 2904 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe 4772 withoutwcs.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 920 cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2724 wrote to memory of 920 2724 cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe 86 PID 2724 wrote to memory of 920 2724 cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe 86 PID 2724 wrote to memory of 920 2724 cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe 86 PID 2904 wrote to memory of 4772 2904 withoutwcs.exe 95 PID 2904 wrote to memory of 4772 2904 withoutwcs.exe 95 PID 2904 wrote to memory of 4772 2904 withoutwcs.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb81d969ca178f002523f835cc9a7b2b_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:920
-
-
C:\Windows\SysWOW64\withoutwcs.exe"C:\Windows\SysWOW64\withoutwcs.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\withoutwcs.exe"C:\Windows\SysWOW64\withoutwcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4772
-