Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 09:23
Behavioral task
behavioral1
Sample
f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
General
-
Target
f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe
-
Size
360KB
-
MD5
f352d0ffcbdd0e16445a1753246664ca
-
SHA1
2f37c5db726a9db9a0e88c5800f5dfd9f8666457
-
SHA256
894086b75688a1108d0a73f49ad12ca19f718c142222836980293422fba1c172
-
SHA512
8dbe50bbb20e661bcf030b8468b10eb9424a994aef45c42329631ce9ff8a86174e2f7e86147b3df86aa8e166d23eed8e182f01eff83616138775e9f3ef3d3e0e
-
SSDEEP
3072:cA2O3T9702oCXeca1BmaKGDbEJglbr4nSeN5WEghgVI8AFMK/U:bT9702oCOcImaKGDbEOGSerEhgVIXFM5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language replrepl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language replrepl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 216 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 216 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 2292 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 2292 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 4092 replrepl.exe 4092 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe 2940 replrepl.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2292 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 216 wrote to memory of 2292 216 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 82 PID 216 wrote to memory of 2292 216 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 82 PID 216 wrote to memory of 2292 216 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 82 PID 4092 wrote to memory of 2940 4092 replrepl.exe 88 PID 4092 wrote to memory of 2940 4092 replrepl.exe 88 PID 4092 wrote to memory of 2940 4092 replrepl.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2292
-
-
C:\Windows\SysWOW64\replrepl.exe"C:\Windows\SysWOW64\replrepl.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\replrepl.exe"C:\Windows\SysWOW64\replrepl.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940
-