Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe
-
Size
204KB
-
MD5
eb201a647a5ec3e8cc19987e5243e1eb
-
SHA1
cafbf342d15b81de21bc89da179755da52af430a
-
SHA256
3c0470a8d8f91efb9a4f948a1e79fbb4bacc850679df029c9748e29475066a7a
-
SHA512
4fbe1a3becfd5194cb0230291eefbc5962e3e9a4b392b3f80248a6789f7dd92f63858a4c4813c5d80882832bb89686e2f016f92d44f86fe76e583e9157ad730f
-
SSDEEP
3072:SnP8nku+im0+v9jnnf95ZRqjFHOJrlnYul0ZuuJPPJ8wxsdOqsJ3MBTyv//:8PQf+S2/RqjQRYR7OOqsJMBmP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stylescatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stylescatch.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2228 eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe 2228 eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe 1072 eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe 1072 eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe 380 stylescatch.exe 380 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe 4928 stylescatch.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1072 eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1072 2228 eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe 82 PID 2228 wrote to memory of 1072 2228 eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe 82 PID 2228 wrote to memory of 1072 2228 eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe 82 PID 380 wrote to memory of 4928 380 stylescatch.exe 88 PID 380 wrote to memory of 4928 380 stylescatch.exe 88 PID 380 wrote to memory of 4928 380 stylescatch.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb201a647a5ec3e8cc19987e5243e1eb_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1072
-
-
C:\Windows\SysWOW64\stylescatch.exe"C:\Windows\SysWOW64\stylescatch.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\stylescatch.exe"C:\Windows\SysWOW64\stylescatch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4928
-