Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe
-
Size
289KB
-
MD5
ea7c2c135472c4c1ba093c035c63d591
-
SHA1
8a21d4efef350a029c3b15a9a0d1e33be73af2d7
-
SHA256
a7f7c22178181bd6a7acb13a04b0e9eed898d7271a4cfbcbb6b12bc5e99b22f0
-
SHA512
d92af2519d1911f5e85a9e0f6fe0027ebadd98fd77feb13b7fee37579bab1024911e56f076ab9a1fc85e67671b699df63f8923858b21f24cde9c51aea7ce6fc8
-
SSDEEP
6144:oMsYO6DtvSsCvarzwtdmUc/11wZB4sOmF9NGkihH/aRG44BZj:ojKtasHAtdFc/YZB4sOs/GffC4BZj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3664 BDC2.tmp -
Loads dropped DLL 2 IoCs
pid Process 2804 ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe 2804 ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BDC2.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2804 ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe 2804 ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2804 wrote to memory of 3664 2804 ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe 90 PID 2804 wrote to memory of 3664 2804 ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe 90 PID 2804 wrote to memory of 3664 2804 ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe 90 PID 2804 wrote to memory of 1212 2804 ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe 91 PID 2804 wrote to memory of 1212 2804 ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe 91 PID 2804 wrote to memory of 1212 2804 ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\BDC2.tmpC:\Users\Admin\AppData\Local\Temp\BDC2.tmp2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea7c2c135472c4c1ba093c035c63d591_JaffaCakes118.exe" --cp "C:\Users\Admin\AppData\Local\Temp\BDD3.tmp"2⤵PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD5d2cd591a98dfd67d2d86f33f37d12def
SHA1e7fa1b1780a3f289d9dceb6e6bfedff20b3a7f05
SHA256bce4c1b88a93d3e818d9524878750d014afa0dad619bfd648c8c285102164b08
SHA5123cb1d765e674c6a82b4c271adcb34f5f930367feca22803fcb7099a202f9422eb19268031069ec2deacf427a76085465002efba217dd92ffecb95af51ba6ea2b
-
Filesize
289KB
MD50d9edee401e3e73cc9d6b6e1e60f3f33
SHA17161f07394fc7381dfc4b8b60b28c1254b06b4b0
SHA2561cb642003ab446729ac6cb21695e22a74e7c7e1cac88e4b749439d7e1851fdb3
SHA5125fa521c28733a0b620f283aaae81782426d9cf7471fcb88b27d42cc5c6cb4bb142b478065ae845f19569b4f6b9c5d16f8da62b89c8da4fca4473f9c4535ed1c1