Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
d991661bafa251d06be4189c13e36856_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d991661bafa251d06be4189c13e36856_JaffaCakes118.exe
-
Size
348KB
-
MD5
d991661bafa251d06be4189c13e36856
-
SHA1
9ef63ef5f234c7296f5a67939624de410027755f
-
SHA256
f5b4f89b6b1dc85c733d49b2eef0b2b23dcc1c3a2914a1f01a6b4fc651c231ec
-
SHA512
a0a58043bf13688693006ba1ab990c3406afcb553927f69578f6ad8c1f1b14ff603878459b9ee0f38e7289beb97e95213672430018d9edebbee5054d28b8b649
-
SSDEEP
3072:alJp9tUQmCcTrslffmseKdNZO+SrEtvFkn5mhFvKR8mewZ6LhBojSC0AmYNwmLb:8ZLZ25KFO89y6L8mC0AmYNwQlzp
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d991661bafa251d06be4189c13e36856_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdmmcdguids.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdmmcdguids.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d991661bafa251d06be4189c13e36856_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3568 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 3568 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 2196 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 2196 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 1380 mdmmcdguids.exe 1380 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe 748 mdmmcdguids.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2196 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3568 wrote to memory of 2196 3568 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 83 PID 3568 wrote to memory of 2196 3568 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 83 PID 3568 wrote to memory of 2196 3568 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 83 PID 1380 wrote to memory of 748 1380 mdmmcdguids.exe 93 PID 1380 wrote to memory of 748 1380 mdmmcdguids.exe 93 PID 1380 wrote to memory of 748 1380 mdmmcdguids.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d991661bafa251d06be4189c13e36856_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d991661bafa251d06be4189c13e36856_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\d991661bafa251d06be4189c13e36856_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d991661bafa251d06be4189c13e36856_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2196
-
-
C:\Windows\SysWOW64\mdmmcdguids.exe"C:\Windows\SysWOW64\mdmmcdguids.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\mdmmcdguids.exe"C:\Windows\SysWOW64\mdmmcdguids.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:748
-