Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe
-
Size
204KB
-
MD5
ef4701659ecf031b713136fa587388fc
-
SHA1
23a94c796bc1dce4b34d9dd2434693e1f58db6de
-
SHA256
df8daf3b8f4bfa739108c0ff1b8ba40c9e2be17f7fc8b7a704e3aa777fbaefae
-
SHA512
b8b642f5ec83b8ba055e1235fbd81aaf2be1ca128a2949d6f96a14abbbf1af235cca2c0f639d796ec8348489a71f2481a39360a3f345e513aec5c06981f93ecc
-
SSDEEP
3072:HbrPNCeBvpiVEiVbmxnhxMDcuPaPPJ8wxsdOqsJ3MBTyv//6Qf:HbrNCeBvpieAih2DtCOOqsJMBmP1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edgecase.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edgecase.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 456 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 456 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 972 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 972 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 232 edgecase.exe 232 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe 3128 edgecase.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 972 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 456 wrote to memory of 972 456 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 82 PID 456 wrote to memory of 972 456 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 82 PID 456 wrote to memory of 972 456 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 82 PID 232 wrote to memory of 3128 232 edgecase.exe 89 PID 232 wrote to memory of 3128 232 edgecase.exe 89 PID 232 wrote to memory of 3128 232 edgecase.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:972
-
-
C:\Windows\SysWOW64\edgecase.exe"C:\Windows\SysWOW64\edgecase.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\edgecase.exe"C:\Windows\SysWOW64\edgecase.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3128
-