Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe
-
Size
113KB
-
MD5
f00186e708e208aa481137c1c5a7de1c
-
SHA1
fc7c82ff341923ac396ce86b6554da7c81abd41f
-
SHA256
9adabf25109832f6fe2ab8dec515ee758a384a25f1f0f53a5f59799bc0ea488e
-
SHA512
b25e1e455701f8e60d41982c52debff6b869014608111095a7018d2b3403f6eb9a01767ea0686c43d07bfbd69fe182293ccf5a9fdb3e32abccf1b610aaa97cfb
-
SSDEEP
3072:2hTDRkQ6E50IsXz0b+45p3fwoYGX2Jt1b3Mk5LL604FIb:2hTDRkQ6E50fD0b+4vvyGX2JHb8k5LLD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2288 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2288 2460 f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2288 2460 f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2288 2460 f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2288 2460 f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f00186e708e208aa481137c1c5a7de1c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Mxv..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5c8407ef0889f6cc059c3ffa0ce999c80
SHA12266a323d93382e0f9c9f1ba2a6abe468fd45dc8
SHA25635b3a18f24e6d3f91586a2d39a5ddf24d11982adc96d129280267c529e93fd91
SHA512fc02b447f4d64c049395aa4e523d4278934cd52cbb1ba5497359535e23cdf200bec1842472d80c19723a8e0e0c98858b973845ef09d88eeab40910f16d1e1032