Analysis
-
max time kernel
130s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
f9367630697814df89999cbfae96c849_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
f9367630697814df89999cbfae96c849_JaffaCakes118.exe
-
Size
350KB
-
MD5
f9367630697814df89999cbfae96c849
-
SHA1
96da64fdd9cb2f5df599cae8ded1e4792b241c17
-
SHA256
8b55db1cd1a5e7dd38027210d81689c20b31b28d934e5e6abced2e2a8c317feb
-
SHA512
5768f0251ec89008b7150027df36b8d3614ad0ff717adde7a7ca9a5a0592fa4e59b418e1ec9aaee185e270f0be7de188d7d7d1bb01c13d65756abca6da6c8abe
-
SSDEEP
3072:mRyuT71ZNMEHzbphQQl/nE9iOYdsODyV3jxSlWMAj:mRyuT5x7hnE9vYNDyVY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9367630697814df89999cbfae96c849_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9367630697814df89999cbfae96c849_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language routerestore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language routerestore.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2960 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 2960 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 4332 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 4332 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 2240 routerestore.exe 2240 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe 3348 routerestore.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4332 f9367630697814df89999cbfae96c849_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2960 wrote to memory of 4332 2960 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 85 PID 2960 wrote to memory of 4332 2960 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 85 PID 2960 wrote to memory of 4332 2960 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 85 PID 2240 wrote to memory of 3348 2240 routerestore.exe 87 PID 2240 wrote to memory of 3348 2240 routerestore.exe 87 PID 2240 wrote to memory of 3348 2240 routerestore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9367630697814df89999cbfae96c849_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9367630697814df89999cbfae96c849_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\f9367630697814df89999cbfae96c849_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9367630697814df89999cbfae96c849_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4332
-
-
C:\Windows\SysWOW64\routerestore.exe"C:\Windows\SysWOW64\routerestore.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\routerestore.exe"C:\Windows\SysWOW64\routerestore.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3348
-