Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe
-
Size
458KB
-
MD5
e37e9301316e68d379f7da55037f19e7
-
SHA1
8fc17b88fd5f2df6c33b420b44d495c4dc2eff19
-
SHA256
6e1beeca97fd9f3fc3bb6007aa56ca99503e2564da3fb4d70b4420794af06810
-
SHA512
9cac90e8e45ff25dbc9ec0d80712f66aae1ca4bae79069ff460f0654dca2ae1b3aac6812d80d315d04c564fe713bcff4e8f796e466091cfd676a33cfd3171601
-
SSDEEP
3072:BbgGwgZ3AmoU3FakRbkJoqxQgYUaDdZWhDdloHljiu92ePsaT2pOfKWkY+hYDQ6/:BlwOvomak6yP/jZslw5kaTwfLX6x6TM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tracediagram.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tracediagram.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4004 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 4004 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 4948 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 4948 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 3720 tracediagram.exe 3720 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe 3404 tracediagram.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4948 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4948 4004 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 82 PID 4004 wrote to memory of 4948 4004 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 82 PID 4004 wrote to memory of 4948 4004 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 82 PID 3720 wrote to memory of 3404 3720 tracediagram.exe 88 PID 3720 wrote to memory of 3404 3720 tracediagram.exe 88 PID 3720 wrote to memory of 3404 3720 tracediagram.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4948
-
-
C:\Windows\SysWOW64\tracediagram.exe"C:\Windows\SysWOW64\tracediagram.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\tracediagram.exe"C:\Windows\SysWOW64\tracediagram.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3404
-