Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe
-
Size
131KB
-
MD5
eac208eaaeade3d7b93abf20e490c070
-
SHA1
661c2227fd98d07cb313491918e96696bc3ef1ed
-
SHA256
47ff5712479094b9b0f56f8355c79f68e6c1cf0a73df81941ba4e15d7869615a
-
SHA512
db699e4154e38de1cd29a7a5986ca17cb1e246075c5b76bcc50e762cc6ef089d7e45141d808ed79887ef3f1b76c73ba5231a1c41862f24180dc9019590c9f6ac
-
SSDEEP
1536:XR6JlmvbgqIKrHkgtuf3O7nGgarSgRwvvwLm8NJLFAKJMV5Vy6KKUKw0Fdnu4w6v:XR6Jk/Ef3OCgaqvYLm8PHRPKUzTksyZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 220 Bpuqya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Bpuqya.exe eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Bpuqya.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Bpuqya.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe File created C:\Windows\Bpuqya.exe eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpuqya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main Bpuqya.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\International Bpuqya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe 220 Bpuqya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4164 wrote to memory of 220 4164 eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe 89 PID 4164 wrote to memory of 220 4164 eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe 89 PID 4164 wrote to memory of 220 4164 eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac208eaaeade3d7b93abf20e490c070_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\Bpuqya.exeC:\Windows\Bpuqya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4384,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=1044 /prefetch:81⤵PID:12464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5eac208eaaeade3d7b93abf20e490c070
SHA1661c2227fd98d07cb313491918e96696bc3ef1ed
SHA25647ff5712479094b9b0f56f8355c79f68e6c1cf0a73df81941ba4e15d7869615a
SHA512db699e4154e38de1cd29a7a5986ca17cb1e246075c5b76bcc50e762cc6ef089d7e45141d808ed79887ef3f1b76c73ba5231a1c41862f24180dc9019590c9f6ac
-
Filesize
390B
MD5cc2bbe887c47a152b75ec5513852a1d8
SHA199387b642fc6745bee0e907e8f2e9c912370c219
SHA256485529686f29f35c5ace60f46a6a042f0220c2c181d25d2179c626b71f1e0d88
SHA512f6ff32fa32ce774ccda5197172c42aa7f50a5ab2f347102ded985e3f7afa1481c3f20d8e00388e2d6bbfb3df3b6d18d39b10cdcfc02398bc8b508ca2a99568a1