Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
d5e00f02414726b9db82eae6a385d6f0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5e00f02414726b9db82eae6a385d6f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5e00f02414726b9db82eae6a385d6f0_JaffaCakes118.exe
-
Size
3.2MB
-
MD5
d5e00f02414726b9db82eae6a385d6f0
-
SHA1
6b7c074b4b3ace796812e4943e361f8a7076cb18
-
SHA256
04b351bc224639a5a2eda9b445867d4f008900c94b69138ba1871a63dd3f355d
-
SHA512
20eb396f1906686c524d1896266169c0a8f8c56747089c716095bb9a3fb8c8b390ba2f0e8ee286f5b744f4d03ec8095affa6d95d17b1f211c1ff0465f5c0113b
-
SSDEEP
98304:Pda+bLyVP4K84nB4OywFhEejk6+FlS2Si5HDknYSmZIVNpnE4MF5i5H5iO:k+bLUQK84BMwFPjkNlSa5DIFmZYNpE4P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5e00f02414726b9db82eae6a385d6f0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 652 cmd.exe 5060 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5060 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3764 wrote to memory of 652 3764 d5e00f02414726b9db82eae6a385d6f0_JaffaCakes118.exe 94 PID 3764 wrote to memory of 652 3764 d5e00f02414726b9db82eae6a385d6f0_JaffaCakes118.exe 94 PID 3764 wrote to memory of 652 3764 d5e00f02414726b9db82eae6a385d6f0_JaffaCakes118.exe 94 PID 652 wrote to memory of 5060 652 cmd.exe 96 PID 652 wrote to memory of 5060 652 cmd.exe 96 PID 652 wrote to memory of 5060 652 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5e00f02414726b9db82eae6a385d6f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5e00f02414726b9db82eae6a385d6f0_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\d5e00f02414726b9db82eae6a385d6f0_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5060
-
-