Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe
-
Size
78KB
-
MD5
f3554f93e653108c6cf12edd54db05ae
-
SHA1
af9f2009ccc0e26f2a4ff32f0c7903cc37d460c6
-
SHA256
e350efd69893b28033dfa6ba293f402c04281453c766022a266ae6be6fbe31aa
-
SHA512
a8f7ea2a5ec7ededaa1f62b47e598f47a44de4b5a87dc66f79f0ca651c661eaa06cf70721f36466ab51065c58502f1ce8b1a4c13bd3cecba741e29e960dc6fe7
-
SSDEEP
1536:GHSpeffJzpa4PKvvMupbRzh7mI565HrVTblQfqA:GHSpefhpa4PKHffw9hTSf
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 bulkwhole.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE bulkwhole.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies bulkwhole.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 bulkwhole.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bulkwhole.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bulkwhole.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix bulkwhole.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" bulkwhole.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" bulkwhole.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4964 bulkwhole.exe 4964 bulkwhole.exe 4964 bulkwhole.exe 4964 bulkwhole.exe 4964 bulkwhole.exe 4964 bulkwhole.exe 4964 bulkwhole.exe 4964 bulkwhole.exe 4964 bulkwhole.exe 4964 bulkwhole.exe 4964 bulkwhole.exe 4964 bulkwhole.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4060 f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2588 wrote to memory of 4060 2588 f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe 82 PID 2588 wrote to memory of 4060 2588 f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe 82 PID 2588 wrote to memory of 4060 2588 f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe 82 PID 1960 wrote to memory of 4964 1960 bulkwhole.exe 89 PID 1960 wrote to memory of 4964 1960 bulkwhole.exe 89 PID 1960 wrote to memory of 4964 1960 bulkwhole.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\f3554f93e653108c6cf12edd54db05ae_JaffaCakes118.exe--38c95f6f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4060
-
-
C:\Windows\SysWOW64\bulkwhole.exe"C:\Windows\SysWOW64\bulkwhole.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\bulkwhole.exe--c14a281b2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4964
-