Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe
-
Size
8KB
-
MD5
d347569e3a0f6bf69b0bc4cb3fa383fc
-
SHA1
831b7bdf777e50f340f2493cfed6bfd957c0856a
-
SHA256
ab72e926dc72ca5fab3caf6d4e8f499410839b54d4c3dab1b48ed464c986fdee
-
SHA512
46bbf21bd3663ac6dde27ad4844a1d9175d0b0dd59a5e06b742f1dda4235cae8dbd23b5f70abce3602c120eb9f257ded447ac78f1462351ded57440d8f763584
-
SSDEEP
96:6CzOECu9Erj3/5By2es091wDI7vr9orjbtet1R+vPabDF3FaoTsFQHUoynpM3:6CKELEr7q2esQ1wYB9GsDF3tHUoynp8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 rusinfo.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rusinfo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2796 2692 d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2796 2692 d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2796 2692 d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2796 2692 d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d347569e3a0f6bf69b0bc4cb3fa383fc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\rusinfo.exe/k2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD5ad7b9c14083b52bc532fba5948342b98
SHA1ee8cbf12d87c4d388f09b4f69bed2e91682920b5
SHA25617f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae
SHA512e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1