Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe
-
Size
132KB
-
MD5
dc6697d94912ca70de32d8bd7717bd50
-
SHA1
1f8c869748933bc8c9a69cb25c3f0ea3f8071075
-
SHA256
0a05e728e40d80db4159ced8760ade6cc66cd1d1c3187bc389801f975ea356a5
-
SHA512
835224f4e306d911a86d647ea6c0a4d92e3ae53b5d0510a8d122c052ec576bf3f0f8b78dfb98a4d468ac6de71881756707c8ee5b56568603727a2076ba804d1b
-
SSDEEP
3072:fGtMGz044wJ/lvfrO9nsirVgMiNWcJZ9KzO9vgYRu9:uSGY44QHrqVrWDNWcYOZL
Malware Config
Signatures
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 190.103.30.186 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelclear.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelclear.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2436 dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe 2436 dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe 4216 dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe 4216 dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe 1712 intelclear.exe 1712 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe 1760 intelclear.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4216 dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2436 wrote to memory of 4216 2436 dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe 83 PID 2436 wrote to memory of 4216 2436 dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe 83 PID 2436 wrote to memory of 4216 2436 dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe 83 PID 1712 wrote to memory of 1760 1712 intelclear.exe 93 PID 1712 wrote to memory of 1760 1712 intelclear.exe 93 PID 1712 wrote to memory of 1760 1712 intelclear.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc6697d94912ca70de32d8bd7717bd50_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4216
-
-
C:\Windows\SysWOW64\intelclear.exe"C:\Windows\SysWOW64\intelclear.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\intelclear.exe"C:\Windows\SysWOW64\intelclear.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1760
-