Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe
-
Size
139KB
-
MD5
eb6b410dcaa6df6ed14f4b05062c88d9
-
SHA1
322cf766f4ed52fe448ef80ed0d83d924f48299f
-
SHA256
8cf212de3d885124a883a2d6a715ead7f9956e1d6d48eaf5f024dcfd4d691442
-
SHA512
db424681fc9d8e67fa5a768de64ca552fa0e7740eb5ef4a6ddbef1c76ec6cddf529277e31474ff2454390f709e0634e42e631eff6aceaea790688d6043ddba02
-
SSDEEP
1536:dP7NjwTkQZ0Cm0cIA6BARp9j2Y8skpUkCQ1sZRVyZ4:9aHZQ0A6BYpB2Ok0QiZnyq
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 IteminaInterop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE IteminaInterop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies IteminaInterop.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 IteminaInterop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IteminaInterop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IteminaInterop.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix IteminaInterop.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" IteminaInterop.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" IteminaInterop.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3544 IteminaInterop.exe 3544 IteminaInterop.exe 3544 IteminaInterop.exe 3544 IteminaInterop.exe 3544 IteminaInterop.exe 3544 IteminaInterop.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2016 eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4336 wrote to memory of 2016 4336 eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe 82 PID 4336 wrote to memory of 2016 4336 eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe 82 PID 4336 wrote to memory of 2016 4336 eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe 82 PID 3512 wrote to memory of 3544 3512 IteminaInterop.exe 86 PID 3512 wrote to memory of 3544 3512 IteminaInterop.exe 86 PID 3512 wrote to memory of 3544 3512 IteminaInterop.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb6b410dcaa6df6ed14f4b05062c88d9_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2016
-
-
C:\Windows\SysWOW64\IteminaInterop.exeC:\Windows\SysWOW64\IteminaInterop.exe1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\IteminaInterop.exe"C:\Windows\SysWOW64\IteminaInterop.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3544
-