Analysis
-
max time kernel
131s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 04:41
Static task
static1
Behavioral task
behavioral1
Sample
ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe
-
Size
156KB
-
MD5
ecdbfa5fa4de3282c7e8d00f73617144
-
SHA1
b7f428d79ffc76577a66d351631ead8fe63f73cd
-
SHA256
27d427aadee0e362b72f541f3e236b136bef133169c6d1d345f214e186ca147d
-
SHA512
c5bd8b9ecdca1c46c988678edac31f3b6ab80bd626021c0c7bfb601f1a63f294cd5da2bcf2900ba54bfc5eadce37ed02627861b3c8aace1a21aa4a51c6857027
-
SSDEEP
1536:lEW90SWuIuyvY7iIWij/vGrQzgcD0Vedw/BNugQBepnN8tquDsqFpUUlF1MGRoW6:OWGSBq6iIHiQz7AJ/OBeZiYGfFHiW6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atalknirmala.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atalknirmala.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4736 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 4736 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 1196 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 1196 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 2852 atalknirmala.exe 2852 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe 2948 atalknirmala.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1196 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4736 wrote to memory of 1196 4736 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 82 PID 4736 wrote to memory of 1196 4736 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 82 PID 4736 wrote to memory of 1196 4736 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 82 PID 2852 wrote to memory of 2948 2852 atalknirmala.exe 89 PID 2852 wrote to memory of 2948 2852 atalknirmala.exe 89 PID 2852 wrote to memory of 2948 2852 atalknirmala.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1196
-
-
C:\Windows\SysWOW64\atalknirmala.exe"C:\Windows\SysWOW64\atalknirmala.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\atalknirmala.exe"C:\Windows\SysWOW64\atalknirmala.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2948
-