Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe
-
Size
7KB
-
MD5
ea90a441dccf90ed71019a7d29fb114a
-
SHA1
2382bfd923a989dd2aa6a75682b534da3d56e8b4
-
SHA256
7e311919c17ad057138fa75d8a32bce0c1e8f4779c82834a5731ecbb5fc863cf
-
SHA512
6c300be8f58e002dd23b361c30bb71da235df951712be7dfb6ba5ad253067f7d4cc2ac491986200ba1e86f862709e1c58c56c8841d7877047fbd8e2f99e630d9
-
SSDEEP
192:YCKZVHHuI1debnp+waY0AYPA48j93WImcFG72j1IyYwFhXYap:Wnx1deTp+waY0AYPejRvTM7k1IyYwrIY
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysexp.dat ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe File created C:\Windows\SysWOW64\syssx.dat ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe File created C:\Windows\SysWOW64\delete_wan.bat ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\delete_wan.bat attrib.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ACADABAE-1000-0010-8000-00AA006D2EA8} ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ACADABAE-1000-0010-8000-00AA006D2EA8}\InProcServer32 ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ACADABAE-1000-0010-8000-00AA006D2EA8}\InProcServer32\ = "C:\\Windows\\system32\\sysexp.dat" ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4664 ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe 4664 ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4664 wrote to memory of 4460 4664 ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe 82 PID 4664 wrote to memory of 4460 4664 ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe 82 PID 4664 wrote to memory of 4460 4664 ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe 82 PID 4460 wrote to memory of 2216 4460 cmd.exe 84 PID 4460 wrote to memory of 2216 4460 cmd.exe 84 PID 4460 wrote to memory of 2216 4460 cmd.exe 84 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2216 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea90a441dccf90ed71019a7d29fb114a_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\delete_wan.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a C:\Windows\system32\delete_wan.bat3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD537017d9b22af8158a9147e8e9547de20
SHA1fd8dee32641dd8920c1a2a8a9354373d6a36d743
SHA256ddef15cff19b5d0400ecb204e1e70e0a2c304523a6595ea89162082af4beb7d0
SHA51238e65d4ec9122f6fac1a4f8da498642eb690545e7721eca8da88169a2a2d129b8830cd00daa7ddf3b41acc1dabbbbf14a481de00ed9ffe5e89451e20dccc6700