Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe
-
Size
65KB
-
MD5
d4f6f0954fd0d5147ed10518921eef44
-
SHA1
ed4831e790f7c2c09719bdc97e3fdef1d36a1b03
-
SHA256
eaca0cb0365f748cc16895185183af4a67778a2cd6eb7ee8c2b5af3a4ea4d0ef
-
SHA512
2d1bd3738f076495068e1563f258d7279a904edb5a4a6359607858edcef4f962504896608e16f4c91bcbc99ea3bf8df92c659c9d890ab1cacd79cfea3347734f
-
SSDEEP
768:5BsypoWmwu+xxDqRQAfTFFLffkYs/g79W7iJzl627SLt8gLOU2FHD+mJ3VseN5Ct:XBoWdHaDLw7iJvu+gFEJah1B+ILaxsq2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4672 wrote to memory of 1536 4672 d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe 90 PID 4672 wrote to memory of 1536 4672 d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe 90 PID 4672 wrote to memory of 1536 4672 d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe 90 PID 1536 wrote to memory of 2024 1536 cmd.exe 92 PID 1536 wrote to memory of 2024 1536 cmd.exe 92 PID 1536 wrote to memory of 2024 1536 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt83136.CMD "C:\Users\Admin\AppData\Local\Temp\d4f6f0954fd0d5147ed10518921eef44_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\rundll32.exerundll32 setupapi,InstallHinfSection DefaultInstall 132 .\setup.inf3⤵
- System Location Discovery: System Language Discovery
PID:2024
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4324,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:81⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82B
MD50341472cb0d92c106d41143e69bd02b6
SHA16526b95d9fa96b2587bf3f32d2b37e986e2dea30
SHA25658403c6052ffcfade638cf0cd5eec138de2b393058e913011f51a9002f11595b
SHA512c329f8676190e4f1e280c3df5680b29cb6e80cdba6d24fa8fe624991352cd6f9b03fb443e30580a5370977df5cb788ff9733d891afff11f0bfedcbf9e5de9498