Analysis
-
max time kernel
7s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe
-
Size
83KB
-
MD5
da1b8e50236075eefae5b804d604c815
-
SHA1
3869d6027c9bef1b2be1fdabb4e996692447d266
-
SHA256
b4420d865ba09403005eb15eb8b93565e874caa6650cb90fbd1295a6c8ee7d04
-
SHA512
4f55466d63a2b8eba9c2cfc38065ccb97ab853cfd93750354d96e29b9ec48403cfda0830b8ef1a86a2f7a78f60a977130a23a5c91a8b51576a5f693a09c358cc
-
SSDEEP
1536:larO2R3XZVPlF31n1TClFvLLcAGJn+yRJCPDz9Ap7DTta9gs3p:lV2BZVPlFlnxClFvLLcA+sPDz9AlTtav
Malware Config
Signatures
-
Drops file in Windows directory 18 IoCs
description ioc Process File opened for modification C:\Windows\win32dc\Silent Hill 4 + cheat.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File created C:\Windows\win32dc\DAoC(cdfix).exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File opened for modification C:\Windows\win32dc\Silent Hill 4(codes).exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File created C:\Windows\win32dc\Half-Life 2 + serial.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File created C:\Windows\win32dc\DAoC + cdfix.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File opened for modification C:\Windows\win32dc\Quake3 hack.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File created C:\Windows\win32dc\Silent Hill 4 + cheat.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File opened for modification C:\Windows\win32dc\BattleField 1942 + trainer.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File created C:\Windows\win32dc\UT2004_serial.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File opened for modification C:\Windows\win32dc\UT2004_serial.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File opened for modification C:\Windows\win32dc\Silent Hill 4_nocd.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File opened for modification C:\Windows\win32dc\DAoC + cdfix.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File created C:\Windows\win32dc\BattleField 1942 + trainer.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File created C:\Windows\win32dc\Silent Hill 4_nocd.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File opened for modification C:\Windows\win32dc\DAoC(cdfix).exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File created C:\Windows\win32dc\Silent Hill 4(codes).exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File created C:\Windows\win32dc\Quake3 hack.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe File created C:\Windows\win32dc\Doom 3 cdfix.exe da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da1b8e50236075eefae5b804d604c815_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3760,i,10369132178352108590,11047993562598554317,262144 --variations-seed-version --mojo-platform-channel-handle=4092 /prefetch:81⤵PID:460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD52de390f9fab24b4271dd8ab575bea888
SHA153bb38ea89c77a011c521d77462c7416aa820581
SHA25694116b039c0e184f4cedcdbc7a37c6ee32fbaeb4a0d29457d5692a2e13de74e3
SHA512246576315d9b7f8cc94cb4bac33dbbf14969f48980bbb97e6f321558b5125949606d71a2d8a5299d11236051cff3cb0460dfa8b3d4187dec28b2a81a6f7ee708