Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 23:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe
Resource
win7-20240729-en
windows7-x64
5 signatures
150 seconds
General
-
Target
df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe
-
Size
268KB
-
MD5
df1d322871e5b7f304dbe62e13917570
-
SHA1
1625a81bb537b4e838663875ef57b2000701e8bc
-
SHA256
5ba9ea4a7b1056993aaa634fc75b153ed35d8d6b73a6a9695f6e4dfccb30b69a
-
SHA512
413c84ef950235481095ecac349c37ac34222edbfbdcf64e306adc30670dd3e6d73f11c4aba7723fa193a20f6cbd8fdff997b25022b68a6a60b5edd6d476352d
-
SSDEEP
6144:TFDcjdo2PnqYCuMlSixsPPplysWCtP0C8G7s579ELspktqmBsdOg:OjdJPnqnuYSlpWm0i7s579ItTsMg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sharedwscapi.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe 3052 sharedwscapi.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4632 cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1880 wrote to memory of 4632 1880 df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe 88 PID 1880 wrote to memory of 4632 1880 df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe 88 PID 1880 wrote to memory of 4632 1880 df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe 88 PID 1880 wrote to memory of 3052 1880 df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe 90 PID 1880 wrote to memory of 3052 1880 df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe 90 PID 1880 wrote to memory of 3052 1880 df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd.exe /C move /Y "C:\Users\Admin\AppData\Local\Temp\df1d322871e5b7f304dbe62e13917570_JaffaCakes118.exe" "C:\Windows\SysWOW64\sharedwscapi.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4632
-
-
C:\Windows\SysWOW64\sharedwscapi.exe"C:\Windows\SysWOW64\sharedwscapi.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3052
-