Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe
-
Size
148KB
-
MD5
d50fd18aac10d482d9921cfe038e9661
-
SHA1
7a7ffa618b37c4b50cd05e3f39b38251daa7049d
-
SHA256
b5ef3b706f84f927c6bcb3d0ce2e418efc0e521c8df342a51b55ac5c0d837f36
-
SHA512
143fb20de9b07cdc44be3707a2cfdef138080580f28ac5df7f334edfdc10081693f66812726179961337f9d02399241c1a7c6349b7e180f5d3f80f75e28ba445
-
SSDEEP
3072:ZxvCBjrvD734HOb3zbSN3zOdfAkKEjXnMX4p5ViHsnTmFIy:ZxvCBjf73CzO9Ak97ngi7iHsTA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2180 Nvoxaa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe File created C:\Windows\Nvoxaa.exe d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe File opened for modification C:\Windows\Nvoxaa.exe d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Nvoxaa.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Nvoxaa.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nvoxaa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Main Nvoxaa.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\International Nvoxaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe 2180 Nvoxaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 2180 4544 d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe 88 PID 4544 wrote to memory of 2180 4544 d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe 88 PID 4544 wrote to memory of 2180 4544 d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d50fd18aac10d482d9921cfe038e9661_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\Nvoxaa.exeC:\Windows\Nvoxaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5d50fd18aac10d482d9921cfe038e9661
SHA17a7ffa618b37c4b50cd05e3f39b38251daa7049d
SHA256b5ef3b706f84f927c6bcb3d0ce2e418efc0e521c8df342a51b55ac5c0d837f36
SHA512143fb20de9b07cdc44be3707a2cfdef138080580f28ac5df7f334edfdc10081693f66812726179961337f9d02399241c1a7c6349b7e180f5d3f80f75e28ba445
-
Filesize
390B
MD5cafd83024c21cd457d2908587d41a4cb
SHA1c93c1a8a230fe72c59931fd0b63790c9902ac3d5
SHA2561725f2105bfb24866bf0b9ee86a8254b82f88924784057e86785a1407e625b45
SHA5121fbc1d5b73ab5395c8ebe3144f65ff1e4482b3c6926b6032177500b429735c32953eba70ebb5154fecc1105cd6b9f14f83a25bb9dc42f39e24d7e7500e91ef10