Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe
-
Size
148KB
-
MD5
f8ae3fc0fa5350d42878cbc2f1305937
-
SHA1
5c8aa0e920d6030508fc7c98df66109ceeca376e
-
SHA256
e21182b21b5d112921c5295b73fa70c514b1052b419143f3b23b0e6807727e70
-
SHA512
759d2edb53a9689a49b8c0d1d4af1f7fef2ec2fe31645e3420adaab01cb2cba0ae5f6e6e16af54fb3b1aa45cb034d98bca46568d4f5f0cc46f16b8fb29667fdc
-
SSDEEP
3072:PWbeau1GwgGe4+NRBL/JlZTV4tNCbCv1/tm48El9TqgCgHSiJgIBXgOF+4C:PQeBCkaRV/JlZmPC+9/TtESS2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adamvsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adamvsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3200 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 3200 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 2612 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 2612 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 1292 adamvsc.exe 1292 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe 1004 adamvsc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2612 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3200 wrote to memory of 2612 3200 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 84 PID 3200 wrote to memory of 2612 3200 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 84 PID 3200 wrote to memory of 2612 3200 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 84 PID 1292 wrote to memory of 1004 1292 adamvsc.exe 86 PID 1292 wrote to memory of 1004 1292 adamvsc.exe 86 PID 1292 wrote to memory of 1004 1292 adamvsc.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2612
-
-
C:\Windows\SysWOW64\adamvsc.exe"C:\Windows\SysWOW64\adamvsc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\adamvsc.exe"C:\Windows\SysWOW64\adamvsc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1004
-