Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe
-
Size
168KB
-
MD5
e4e52cd9f6d6be97ee805def0c8644ed
-
SHA1
1fbbd6d4decb102e15f8c3e545d06a2006e8ef08
-
SHA256
efd9f27dc06fe39568ed2123ce4ac69c696fa62eec9e5ce60f6e5b6f4a0eac7b
-
SHA512
de83b6dc3d7cd8e42ddfb3468e2803e5b75c17d03dc4c9d5c63210a74d5263a7875ceeffa7d8a2a80a9bb2e29fa6e868d9376f9ed2f8a00411dbe0a958cecb75
-
SSDEEP
3072:IWVPtoludJgQz2SDKTR/VS4k5/0lUWY86bIWLLNrme/1Z:XVleugGLZ4Kd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jerseyrepl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jerseyrepl.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4800 e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe 4800 e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe 4700 e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe 4700 e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe 4108 jerseyrepl.exe 4108 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe 1432 jerseyrepl.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4700 e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4800 wrote to memory of 4700 4800 e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe 82 PID 4800 wrote to memory of 4700 4800 e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe 82 PID 4800 wrote to memory of 4700 4800 e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe 82 PID 4108 wrote to memory of 1432 4108 jerseyrepl.exe 88 PID 4108 wrote to memory of 1432 4108 jerseyrepl.exe 88 PID 4108 wrote to memory of 1432 4108 jerseyrepl.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4e52cd9f6d6be97ee805def0c8644ed_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4700
-
-
C:\Windows\SysWOW64\jerseyrepl.exe"C:\Windows\SysWOW64\jerseyrepl.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\jerseyrepl.exe"C:\Windows\SysWOW64\jerseyrepl.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1432
-