Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe
-
Size
59KB
-
MD5
f04bc8930d3222ea8c5503c29d0d1bfc
-
SHA1
7d1f9f1b7a6dcd62a32f2d97dc6818e862851c76
-
SHA256
d8dfa84f191497422ce2dee5f785d57bef6fe9b61897d89a5c0cc567ba4d7c33
-
SHA512
7b6b779ff2173bf961311cc2dc1c076c660228cc46594a21126c19faef2e4847675a18e1e14997cd9113d8e4043dcf1465e4b0de63cef8488f22734dab27edde
-
SSDEEP
1536:c9wvQUreUbyzABq2e5khOBY/tc4S5zUv2:MA/yzv2e5kgBYm4iwv2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1868 2128 f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe 32 PID 2128 wrote to memory of 1868 2128 f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe 32 PID 2128 wrote to memory of 1868 2128 f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe 32 PID 2128 wrote to memory of 1868 2128 f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DDB2.bat "C:\Users\Admin\AppData\Local\Temp\f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fc7bb485ebc5ed2b40ada16f49bf7ff4
SHA17a40de737758939524c04dc1c17bafbb35a1b9b6
SHA256476503ac5a76715f9b1dc81f6d5824522b13c870573563fb685a967a16bd105f
SHA512ca592f7f44c1211ca0757bb9b6772dc5d3f6c293e67f66e3178a555d4ebeb285df21fa5fe3f0c6db3a235e1502915f42fa63cc7921e5f7a106b1366116b8c7be