Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe
-
Size
457KB
-
MD5
cdc7dc0fd5675620eb6239a09065821d
-
SHA1
87543bbf2e919972b27aefbb9f209c765e00ab6d
-
SHA256
6c5fa1c0a0c3860b2775ed00c52a2959173d04b597528a1f876bc057d417cb45
-
SHA512
a022708f3538e15a024ac421a7c85474aa2f68404b7a68e95936b6eecba18847b6032f0b7bb65f3d37c8fda9539c9e20540ea04431ab1847237f426861e97a33
-
SSDEEP
6144:3huTlwinUnUYTtp6g6ePQcWqXU/i4zo2Tgq3XWgXrCr7tq5UQM:3hkZnUnUYTP6fghW6B4U2M6f+FQM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language royaleexample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language royaleexample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2212 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 2212 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 4116 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 4116 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 4984 royaleexample.exe 4984 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe 2876 royaleexample.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4116 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2212 wrote to memory of 4116 2212 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 84 PID 2212 wrote to memory of 4116 2212 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 84 PID 2212 wrote to memory of 4116 2212 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 84 PID 4984 wrote to memory of 2876 4984 royaleexample.exe 94 PID 4984 wrote to memory of 2876 4984 royaleexample.exe 94 PID 4984 wrote to memory of 2876 4984 royaleexample.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4116
-
-
C:\Windows\SysWOW64\royaleexample.exe"C:\Windows\SysWOW64\royaleexample.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\royaleexample.exe"C:\Windows\SysWOW64\royaleexample.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2876
-