Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 17:06
Static task
static1
Behavioral task
behavioral1
Sample
e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe
-
Size
128KB
-
MD5
e0a2f2c57af359d30015a8cf3b8f1d62
-
SHA1
2e2ddd8e55170939c7ca318a9b90fe67e97e07c3
-
SHA256
8885755dd515d44a9d7b9101de8775f77a2b415648543c7140a44af003c99ce0
-
SHA512
568d95900a9ce06a2a10d112726aee77b49526be2b0d81486c94dcdc5d43d5c8ed536a807083570ea9b5bd11f6a7a3cbdfee451df68399d728fac5c37fca6009
-
SSDEEP
3072:uGHi6mwKnMCiGnivTqE5XxnptiaxHPTvFG/W:+5nQGnibqEdti0TvFw
Malware Config
Extracted
pony
http://67.215.225.205:8080/forum/viewtopic.php
http://216.231.139.111/forum/viewtopic.php
-
payload_url
http://fuerzav.vectorialstudios.com/4Gxf.exe
http://riegotec.com.mx/fgGq.exe
http://modaitaliaclub.com/LdKtM6.exe
http://successwithmichael.com/Dj8vftG.exe
http://piscinasangra.com/oP3yge.exe
http://p933.phpnet.org/0uVk8W2Z.exe
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2512 2780 e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2512 2780 e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2512 2780 e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2512 2780 e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0a2f2c57af359d30015a8cf3b8f1d62_JaffaCakes118.exe"2⤵PID:2512
-