Analysis
-
max time kernel
106s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
d0f0dec8c6c984a37abafbeb770e09da_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0f0dec8c6c984a37abafbeb770e09da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0f0dec8c6c984a37abafbeb770e09da_JaffaCakes118.exe
-
Size
470KB
-
MD5
d0f0dec8c6c984a37abafbeb770e09da
-
SHA1
ef8537450d875f91279a49787f666286ed43bd4c
-
SHA256
134078cf163166b7445788719848f9d4d115bd201628bc2328292483f0852d1a
-
SHA512
1dcd0f68f18f988046df89cb952c8b31ca276c520bed3beaf1360e5f02763105a0cd98fd0d2ae868cad51247338b09b985221dcdffab3dfeb68ea0956825157e
-
SSDEEP
12288:Nx5ARbqSj6AmDImva+3Vqckf+ewtWZhrS:Nx5IJO0mvaes+ewtOhrS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0f0dec8c6c984a37abafbeb770e09da_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2364 PING.EXE 3544 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2364 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 976 wrote to memory of 3544 976 d0f0dec8c6c984a37abafbeb770e09da_JaffaCakes118.exe 87 PID 976 wrote to memory of 3544 976 d0f0dec8c6c984a37abafbeb770e09da_JaffaCakes118.exe 87 PID 976 wrote to memory of 3544 976 d0f0dec8c6c984a37abafbeb770e09da_JaffaCakes118.exe 87 PID 3544 wrote to memory of 2364 3544 cmd.exe 89 PID 3544 wrote to memory of 2364 3544 cmd.exe 89 PID 3544 wrote to memory of 2364 3544 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0f0dec8c6c984a37abafbeb770e09da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0f0dec8c6c984a37abafbeb770e09da_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\d0f0dec8c6c984a37abafbeb770e09da_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2364
-
-