Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe
-
Size
168KB
-
MD5
e36fa261697b3d09989d9f37b4eaf7b8
-
SHA1
f24520d28abf7755e13c11595be4d2875e7b1e8a
-
SHA256
7ff74dfe2aea2073e698eb489a20ef687450dfce2a9b87fb588a5e9314ceeee0
-
SHA512
7796c4dae8d81a86b6a3c36c4fd4fc15ba29b47ca675ab4eef55b5d76dd31f2a7c8458b43cadb2acb6191fb433090eb7203607cd3ce04e35add899492f3368d6
-
SSDEEP
3072:AOcwqx2eHI6ptwmAm/TnxZ7xZ2sz0CXmA/:AOheHI6ptwvOTxFHACd/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemrowset.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemrowset.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4700 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 4700 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 3188 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 3188 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 4784 systemrowset.exe 4784 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe 1944 systemrowset.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3188 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3188 4700 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 82 PID 4700 wrote to memory of 3188 4700 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 82 PID 4700 wrote to memory of 3188 4700 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 82 PID 4784 wrote to memory of 1944 4784 systemrowset.exe 88 PID 4784 wrote to memory of 1944 4784 systemrowset.exe 88 PID 4784 wrote to memory of 1944 4784 systemrowset.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3188
-
-
C:\Windows\SysWOW64\systemrowset.exe"C:\Windows\SysWOW64\systemrowset.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\systemrowset.exe"C:\Windows\SysWOW64\systemrowset.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944
-