Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
e1a3815002650fae545dc509e6379927_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1a3815002650fae545dc509e6379927_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1a3815002650fae545dc509e6379927_JaffaCakes118.exe
-
Size
8.3MB
-
MD5
e1a3815002650fae545dc509e6379927
-
SHA1
cfe79246c5da05afc32e3099528cea0f8eeb324a
-
SHA256
2b796bb5c6a16d5497ec15d17bc6935ac80697a52809fec119c0504d060d17ff
-
SHA512
58b179cb606e80baf9cafd2b68de13a8923eba9be920dcb70a615c04726ee1fafb3f57839ca3f1d3409bd6985bb34d1ef65c508bb9acd361955a41e90f475fa9
-
SSDEEP
98304:EcKeYe1eLy1eLYeYe1eLy16LNe1eLy16GeYe1eL71u:Em
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5072 sx.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1a3815002650fae545dc509e6379927_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5072 sx.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 5072 sx.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5072 sx.exe 5072 sx.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3160 wrote to memory of 5072 3160 e1a3815002650fae545dc509e6379927_JaffaCakes118.exe 85 PID 3160 wrote to memory of 5072 3160 e1a3815002650fae545dc509e6379927_JaffaCakes118.exe 85 PID 3160 wrote to memory of 5072 3160 e1a3815002650fae545dc509e6379927_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1a3815002650fae545dc509e6379927_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1a3815002650fae545dc509e6379927_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\sx.exeC:\Users\Admin\AppData\Local\Temp\sx.exe -run C:\Users\Admin\AppData\Local\Temp\e1a3815002650fae545dc509e6379927_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.3MB
MD5624e897cd2a30b5caf466ae1ed2d7c66
SHA1052c15287fe2dd3f4608016158ede96bb168e8de
SHA25621d323f9c5a59dd06b7c976ee0acfe45753dba1c36b2544b6d362bb2696773a2
SHA512ff6283e1eab18824bdb7ef22625a053f44e8027f44c23b6b3d6313e142481a04275d881c52070afe8937232ed50115a09c0985deba6e0a36652f8756feddb2e1