Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe
-
Size
424KB
-
MD5
dc66b0e1f33e0bfeaa1686e5959f96cc
-
SHA1
9b40bc06c49a7f09741a38c5d26b388a6f84f02c
-
SHA256
d9132f3fe8f5b57df70214a65bd9dfbb6e89867c6efbf89abb74640acaf4b585
-
SHA512
c77d9d21297fbf604171e8b988b77dde60fc1ede790d34e50db02ba5f3d00e9108246b2ff5fbcbb88c341c1fbb55ab0bb2e2f493e2891e43255ec3b1662d8508
-
SSDEEP
12288:UXaZR9waB2MGWiyExSI2eBiGZ9K3Z0zMzSEH8BZ2fSB:RBD2MGWiyExSInBiF04ez
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1808 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3032 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1808 2356 dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe 30 PID 2356 wrote to memory of 1808 2356 dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe 30 PID 2356 wrote to memory of 1808 2356 dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe 30 PID 2356 wrote to memory of 1808 2356 dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe 30 PID 1808 wrote to memory of 3032 1808 cmd.exe 32 PID 1808 wrote to memory of 3032 1808 cmd.exe 32 PID 1808 wrote to memory of 3032 1808 cmd.exe 32 PID 1808 wrote to memory of 3032 1808 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\dc66b0e1f33e0bfeaa1686e5959f96cc_JaffaCakes118.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3032
-
-