Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe
-
Size
3.7MB
-
MD5
ebf2ad6c4a698f224a7cd3fb232718f8
-
SHA1
2c2b3f65df6f4b14b08d88c28ce28ca695f57021
-
SHA256
1f7b8a423ac617bf9739d212810e2a9d75f6ce00a6c25ebb7ce3fc02d588246f
-
SHA512
cd1354c795ac01a9fe22ca64ab99006453d349b40ddd1a8853fd1998db6eeef8b58c6c5d3a3850ced945e365acd0948bf19975a7de9aec30e75796a43ae504d5
-
SSDEEP
98304:X59BpfVMZXB+K9KC7uVuboSe4UuhJxeXp+YgHxL5IIX3:HtMf+quVfoUcaXs/PIIH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2296 ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.tmp -
Loads dropped DLL 1 IoCs
pid Process 1044 ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2296 1044 ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2296 1044 ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2296 1044 ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2296 1044 ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2296 1044 ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2296 1044 ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2296 1044 ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\is-AHNB3.tmp\ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-AHNB3.tmp\ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.tmp" /SL5="$4010A,3590226,57856,C:\Users\Admin\AppData\Local\Temp\ebf2ad6c4a698f224a7cd3fb232718f8_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49