Analysis
-
max time kernel
92s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
eb53ff2ccec4cf04827ca19b516a5490_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb53ff2ccec4cf04827ca19b516a5490_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb53ff2ccec4cf04827ca19b516a5490_JaffaCakes118.exe
-
Size
72KB
-
MD5
eb53ff2ccec4cf04827ca19b516a5490
-
SHA1
49b524cb7c4e02255de6b3b27ef08a0759b42276
-
SHA256
b2c4c2916681f4bf7a38b4de93e301afd01e4061ddcb58451a5133a27a3c546b
-
SHA512
89ef487f1eded8adcb7e00f731dbfa80e1ca65ee9b1f863de88c712ed88548e78437339aa81e5b10626a0dcfd71cf50b7891fb9f1215fa35acfb23a466aa728c
-
SSDEEP
1536:s8LxwO+SJj7x6nYSAqIpTJE4GmskRvosQqqs:s8LxmSJjQEzrT9/Ss
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation eb53ff2ccec4cf04827ca19b516a5490_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb53ff2ccec4cf04827ca19b516a5490_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3316 wrote to memory of 2368 3316 eb53ff2ccec4cf04827ca19b516a5490_JaffaCakes118.exe 84 PID 3316 wrote to memory of 2368 3316 eb53ff2ccec4cf04827ca19b516a5490_JaffaCakes118.exe 84 PID 3316 wrote to memory of 2368 3316 eb53ff2ccec4cf04827ca19b516a5490_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb53ff2ccec4cf04827ca19b516a5490_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb53ff2ccec4cf04827ca19b516a5490_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Jxz..bat" > nul 2> nul2⤵
- System Location Discovery: System Language Discovery
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD55b141287593164f7b12dcc2183ab0824
SHA1b3d586883feaabe2abac6023a888875378f62f8a
SHA25619f60c671e2f68e2311ca6bbb8e0bd8456355c06f309cf7ccab64e944548e72c
SHA5126342a3ae3047ee1c98d5869e898f9f10c9d23252435b98001ed0e126979ebaccd5573ca20621f999bbcd0e87290e6418aaed570efed10e12a9b6260f266570ad