Analysis
-
max time kernel
124s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
f302f330e11eae9a66647e6f87add648_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f302f330e11eae9a66647e6f87add648_JaffaCakes118.exe
-
Size
128KB
-
MD5
f302f330e11eae9a66647e6f87add648
-
SHA1
abde24bf818994c5f51d63201b8e4f6d86fd82ba
-
SHA256
2958c7d173be690118582f6f5f0e80c954ba61b1c72effd98d5cf525bec576f6
-
SHA512
1a4b5ab17cc077bb5d5440c90425744603407bfaa3316a74d0737fe3dc9df2a12c63482ea8b19b336fb2da33a22c79a45e59a4c4a581978d23e6ab89933f050a
-
SSDEEP
3072:uGHi6mw3Dl3q65eRX6BBZnF4ZohM+sJNH2MkHfbZjH:+gDs65m6BBjFhMFH2MkN
Malware Config
Extracted
pony
http://67.215.225.205:8080/forum/viewtopic.php
http://216.231.139.111/forum/viewtopic.php
-
payload_url
http://ctl-mexico.com/WtgME.exe
http://cvilleshootingstars.com/JzU.exe
http://ctamdq.org.ar/bigQm.exe
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f302f330e11eae9a66647e6f87add648_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 2772 3344 f302f330e11eae9a66647e6f87add648_JaffaCakes118.exe 93 PID 3344 wrote to memory of 2772 3344 f302f330e11eae9a66647e6f87add648_JaffaCakes118.exe 93 PID 3344 wrote to memory of 2772 3344 f302f330e11eae9a66647e6f87add648_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f302f330e11eae9a66647e6f87add648_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f302f330e11eae9a66647e6f87add648_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\f302f330e11eae9a66647e6f87add648_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f302f330e11eae9a66647e6f87add648_JaffaCakes118.exe"2⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3960,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=1308 /prefetch:81⤵PID:3188