Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 05:56
Static task
static1
Behavioral task
behavioral1
Sample
ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe
-
Size
306KB
-
MD5
ef2fc995637f28a47ec96592c17a373c
-
SHA1
17ab811ae39e0c271a22ad7fee727ecd9fce51d2
-
SHA256
f6885254828fe0d341adf12a93f090f2877ee7eb99a9e27408c8fdd5121d3ecb
-
SHA512
3dc20aed34ca590d9c515d3679eed9d87b5e30e5cbfd4604c5cc4ea868180dfc1766415301bc8705eb3de5b483dd19cb4d71589ec6b66bca35106ffa3b77e5db
-
SSDEEP
6144:lhtLAppKkUTtvh2VuL6g8+fGKVMc3+toJFihLt3A+l:tApUTVAuL6gvfG+dJFihLt3A+l
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language singlecbs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language singlecbs.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4944 ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe 4944 ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe 4560 ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe 4560 ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe 5064 singlecbs.exe 5064 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe 4284 singlecbs.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4560 ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4560 4944 ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe 84 PID 4944 wrote to memory of 4560 4944 ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe 84 PID 4944 wrote to memory of 4560 4944 ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe 84 PID 5064 wrote to memory of 4284 5064 singlecbs.exe 90 PID 5064 wrote to memory of 4284 5064 singlecbs.exe 90 PID 5064 wrote to memory of 4284 5064 singlecbs.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef2fc995637f28a47ec96592c17a373c_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4560
-
-
C:\Windows\SysWOW64\singlecbs.exe"C:\Windows\SysWOW64\singlecbs.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\singlecbs.exe"C:\Windows\SysWOW64\singlecbs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4284
-