Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe
-
Size
306KB
-
MD5
cb9428c8965c8d48f5f3ca0236fcc28c
-
SHA1
e222e2ac35dec32973c554b1502a1719460d68a2
-
SHA256
cf0fd5544c94b0b45d7168ad5c2fcc28502eaeb0a7f89656eb726e9fa89e32e4
-
SHA512
80264af772509c1ce7aa2c6954c53b230c318f9a51a6f399ccd5ac45fdab6bedce4063aeefdd404c3fe2109051faace528b870fe0a77873bbbc8ce7f1468576d
-
SSDEEP
6144:63LEppKQUTtvh2VuL6g8+fGKrQ3+toJFihLt3A++:+EpITVAuL6gvfGBdJFihLt3A++
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language limelime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language limelime.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1656 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 1656 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 1612 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 1612 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 2684 limelime.exe 2684 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe 2572 limelime.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1612 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1612 1656 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 87 PID 1656 wrote to memory of 1612 1656 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 87 PID 1656 wrote to memory of 1612 1656 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 87 PID 2684 wrote to memory of 2572 2684 limelime.exe 96 PID 2684 wrote to memory of 2572 2684 limelime.exe 96 PID 2684 wrote to memory of 2572 2684 limelime.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1612
-
-
C:\Windows\SysWOW64\limelime.exe"C:\Windows\SysWOW64\limelime.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\limelime.exe"C:\Windows\SysWOW64\limelime.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2572
-