Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe
-
Size
652KB
-
MD5
d193736c7f30ac06b4e8b0c1b3978826
-
SHA1
165f7d7f19800258dc343ecfcf07c2be04984eea
-
SHA256
14e9ac5e25986ccf97a2b6c659342c9bf9411705d244792f5d8c4e961b9c2c81
-
SHA512
bc8c3613a1230d067531267042cc21d0ce116f123f6fb1e6b3077f1c401fc29927ec73200e5af85eda47e1bcd936aee8d30a4aae8f91dca5825bdea06f175628
-
SSDEEP
12288:X47he1vBLQXkYJ3joBRJ3EwR8zDygiwxpRARzobk31vRrh:I7wJBnvx8yJwxpRARzoQRd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4652 wrote to memory of 4520 4652 d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe 83 PID 4652 wrote to memory of 4520 4652 d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe 83 PID 4652 wrote to memory of 4520 4652 d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe 83 PID 4652 wrote to memory of 3340 4652 d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe 84 PID 4652 wrote to memory of 3340 4652 d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe 84 PID 4652 wrote to memory of 3340 4652 d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exestart2⤵
- System Location Discovery: System Language Discovery
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\d193736c7f30ac06b4e8b0c1b3978826_JaffaCakes118.exewatch2⤵
- System Location Discovery: System Language Discovery
PID:3340
-