Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 23:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
General
-
Target
e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe
-
Size
351KB
-
MD5
e5c5ba17d9bb9a06bb1ae7e0ee487738
-
SHA1
4544d3c86ca59cb897779f0f18b7ad66165e895a
-
SHA256
7a193445506edfba002de1305d534512aa052417ebedff3829bf830b5289b528
-
SHA512
be9071b5da7608fc9683213dcf4be0877f7a8f298163d1b3d7733e20878478daf2ab7307f6dfa926c594d82f747f48285f1baa376a3e180ec627f74d559c99a7
-
SSDEEP
3072:HR7jbNafUsiVVCgNgWSagbJMgA7XphMc23x:HR7HY8fuYg/7GvVqc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runningfetch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runningfetch.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3920 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 3920 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 3924 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 3924 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 1180 runningfetch.exe 1180 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe 5040 runningfetch.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3924 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3920 wrote to memory of 3924 3920 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 89 PID 3920 wrote to memory of 3924 3920 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 89 PID 3920 wrote to memory of 3924 3920 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 89 PID 1180 wrote to memory of 5040 1180 runningfetch.exe 95 PID 1180 wrote to memory of 5040 1180 runningfetch.exe 95 PID 1180 wrote to memory of 5040 1180 runningfetch.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3924
-
-
C:\Windows\SysWOW64\runningfetch.exe"C:\Windows\SysWOW64\runningfetch.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\runningfetch.exe"C:\Windows\SysWOW64\runningfetch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4384,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=3820 /prefetch:81⤵PID:1392