Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe
-
Size
140KB
-
MD5
ece6da6784cf8a772cb73a37b02ba4a5
-
SHA1
aa15cc324a36cad5a549a6e4ca5c6dabff5b0d2a
-
SHA256
b3eb40865a7bbf708dad012a168aae4003b455d90891d92a340b2087e1b96ea7
-
SHA512
11dad06c82db5a21e0cbfbb96f2475b436f79becd570420f7160c7bf7dfc451ed317c28fda1387beac5e5a47da43c4825eeeba0a9ce514b2544093ca95d9e962
-
SSDEEP
3072:njWGlM5RaoCcQXUbs10tqSbE0ZivIpGI/zsvYb:njOBS0tq/ReGIwv
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language metagenpnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language metagenpnp.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1376 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 1376 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 2300 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 2300 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 3120 metagenpnp.exe 3120 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe 1140 metagenpnp.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2300 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2300 1376 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 81 PID 1376 wrote to memory of 2300 1376 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 81 PID 1376 wrote to memory of 2300 1376 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 81 PID 3120 wrote to memory of 1140 3120 metagenpnp.exe 87 PID 3120 wrote to memory of 1140 3120 metagenpnp.exe 87 PID 3120 wrote to memory of 1140 3120 metagenpnp.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2300
-
-
C:\Windows\SysWOW64\metagenpnp.exe"C:\Windows\SysWOW64\metagenpnp.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\metagenpnp.exe"C:\Windows\SysWOW64\metagenpnp.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1140
-