Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe
-
Size
396KB
-
MD5
d3822a8deb6ca82717b8cbbd4218e641
-
SHA1
c7c2fe7a3d3845a1ed4856e75848d1b87d617a9a
-
SHA256
400b56c426f9a33eb9250c90f0000e474c64d088135f7a5a6d721e17f4121f6e
-
SHA512
76c2fb7dc362c36aed0e57f2c4cd2e02cbd934eadba6272ceeb119deb3a8bc99850685e63e121d27a1400ae02053f2d9eaddf58c775083bf0c658d872d6f38cc
-
SSDEEP
3072:HTuLDHO7KrklcdERNqDNG9ntxZcE6YB6cV9gDCyo04Nd7NryaD8QjJrH4Ab2ny6R:u7/olbRNqD0Tck6cV99DNryijFHnbc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language montanamontana.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language montanamontana.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4996 d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe 4996 d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe 3620 d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe 3620 d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe 1576 montanamontana.exe 1576 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe 820 montanamontana.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3620 d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4996 wrote to memory of 3620 4996 d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe 83 PID 4996 wrote to memory of 3620 4996 d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe 83 PID 4996 wrote to memory of 3620 4996 d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe 83 PID 1576 wrote to memory of 820 1576 montanamontana.exe 93 PID 1576 wrote to memory of 820 1576 montanamontana.exe 93 PID 1576 wrote to memory of 820 1576 montanamontana.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3822a8deb6ca82717b8cbbd4218e641_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3620
-
-
C:\Windows\SysWOW64\montanamontana.exe"C:\Windows\SysWOW64\montanamontana.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\montanamontana.exe"C:\Windows\SysWOW64\montanamontana.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:820
-