Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 08:13
Static task
static1
Behavioral task
behavioral1
Sample
dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe
-
Size
124KB
-
MD5
dc1c4add0e86b1aea520fa4b04e7aacd
-
SHA1
17ffe5927ecfabe9b352d2aaf899c63f3e024533
-
SHA256
671b3c57f8a60a44c1a5221225afb8dc3a312c55a27e78f5ca185cda6af534a9
-
SHA512
9ab3408e5364bf7bbfaca6254e4e2ece8817139456a6561db33de20f492b819e6d4792529f0436312878abbc23d4a200053114bacb090cbd0bbbd9085821842e
-
SSDEEP
1536:ez4IxRPBl6ekZHQC0td1nULzTrQCITycBlHLRB4yoIr/DozpKmzbHbAh:RIxRPsS3tULr6ll0K/DW1zc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exedc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exelanesboost.exelanesboost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lanesboost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lanesboost.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exedc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exelanesboost.exelanesboost.exepid Process 4952 dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe 4952 dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe 2492 dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe 2492 dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe 4388 lanesboost.exe 4388 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe 840 lanesboost.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exepid Process 2492 dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exelanesboost.exedescription pid Process procid_target PID 4952 wrote to memory of 2492 4952 dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe 83 PID 4952 wrote to memory of 2492 4952 dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe 83 PID 4952 wrote to memory of 2492 4952 dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe 83 PID 4388 wrote to memory of 840 4388 lanesboost.exe 91 PID 4388 wrote to memory of 840 4388 lanesboost.exe 91 PID 4388 wrote to memory of 840 4388 lanesboost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc1c4add0e86b1aea520fa4b04e7aacd_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2492
-
-
C:\Windows\SysWOW64\lanesboost.exe"C:\Windows\SysWOW64\lanesboost.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\lanesboost.exe"C:\Windows\SysWOW64\lanesboost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:840
-