Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
d0fb227dfc48c83e1409e55ae2edeb95_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0fb227dfc48c83e1409e55ae2edeb95_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0fb227dfc48c83e1409e55ae2edeb95_JaffaCakes118.exe
-
Size
746KB
-
MD5
d0fb227dfc48c83e1409e55ae2edeb95
-
SHA1
0b70dbb309ddf7fc39159327e48388a5d85d8cc1
-
SHA256
c264594869305542c4f3335eb1de6e16b887580673c4b3674260ad9655d53cfb
-
SHA512
bba4df77a98d2632674c6c4ac7e184cbb7221a6e9fa3d0b5c6edb39b3cd054a03784cac3472f409110c6b70100a40ce53e8aec0fa4ccbee3288c7dd571224c18
-
SSDEEP
12288:un4aeBqJ9gAMJtUIfu+AsGyByce/9UfUQvc6tqWCEbhP5YE+6FqT7ae3MoJ4+iFe:bOulfu+AsccIUflnFFqbMkWXC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3236 w.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\UNDEL.BAT d0fb227dfc48c83e1409e55ae2edeb95_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0fb227dfc48c83e1409e55ae2edeb95_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3236 w.exe 3236 w.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2144 2812 d0fb227dfc48c83e1409e55ae2edeb95_JaffaCakes118.exe 88 PID 2812 wrote to memory of 2144 2812 d0fb227dfc48c83e1409e55ae2edeb95_JaffaCakes118.exe 88 PID 2812 wrote to memory of 2144 2812 d0fb227dfc48c83e1409e55ae2edeb95_JaffaCakes118.exe 88 PID 3236 wrote to memory of 3500 3236 w.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\d0fb227dfc48c83e1409e55ae2edeb95_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0fb227dfc48c83e1409e55ae2edeb95_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\UNDEL.BAT3⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Windowssystem32\w.exeC:\Windowssystem32\w.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD5513cfd306d64c395408909a94756d62d
SHA185d696fdcffb23012b69112a5b1a73ddf3b4f452
SHA2561588e4697e047531fa1e990c9a109ce7d5bb1d0a92d58858b0e8aebf75f5b122
SHA51257405ae203fe999af852b5d9b6b7093131d486d49cb4e467d821108cdae7378d3f5ec6c1ca5ec19702c3040852306a24aa910f6c4caa14b9efdf38944f70c540
-
Filesize
746KB
MD5d0fb227dfc48c83e1409e55ae2edeb95
SHA10b70dbb309ddf7fc39159327e48388a5d85d8cc1
SHA256c264594869305542c4f3335eb1de6e16b887580673c4b3674260ad9655d53cfb
SHA512bba4df77a98d2632674c6c4ac7e184cbb7221a6e9fa3d0b5c6edb39b3cd054a03784cac3472f409110c6b70100a40ce53e8aec0fa4ccbee3288c7dd571224c18