Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 05:20
Behavioral task
behavioral1
Sample
d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe
-
Size
349KB
-
MD5
d3a225b52a96a561e17679a714f8f0ae
-
SHA1
bf8dbcd17973d23f89622203dcd1c41340656150
-
SHA256
38a389ae3b625c324dd44b8707169407bf5a39a3310841da29db13f30a3a41ec
-
SHA512
f11b80f20eb6482fe8ebc3dada8612d31d9e6727b91275bd9b8f28dcf6cb1cd07943afde13bf4ef46316fe1119d0dd6ca6205a61abc4fddbaa3baa6e490d3735
-
SSDEEP
6144:bBf46wO7HK3Uwo5VUg+4sEjoKnun1Knun1Knun1Knun1Knun1Knun1Knun1Knun0:9f9oWVp2WOWOWOWOWOWOWOWOW1oPx/s
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 avgculture.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE avgculture.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies avgculture.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 avgculture.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avgculture.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avgculture.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix avgculture.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" avgculture.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" avgculture.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4884 avgculture.exe 4884 avgculture.exe 4884 avgculture.exe 4884 avgculture.exe 4884 avgculture.exe 4884 avgculture.exe 4884 avgculture.exe 4884 avgculture.exe 4884 avgculture.exe 4884 avgculture.exe 4884 avgculture.exe 4884 avgculture.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3760 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4260 wrote to memory of 3760 4260 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe 86 PID 4260 wrote to memory of 3760 4260 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe 86 PID 4260 wrote to memory of 3760 4260 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe 86 PID 1536 wrote to memory of 4884 1536 avgculture.exe 89 PID 1536 wrote to memory of 4884 1536 avgculture.exe 89 PID 1536 wrote to memory of 4884 1536 avgculture.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe--3028d6032⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3760
-
-
C:\Windows\SysWOW64\avgculture.exe"C:\Windows\SysWOW64\avgculture.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\avgculture.exe--ed713c4e2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4884
-