Analysis
-
max time kernel
94s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
f9aa107d2a3f52f3bd7d34c47b25f31b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9aa107d2a3f52f3bd7d34c47b25f31b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/BetterInstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/BetterInstaller.exe
Resource
win10v2004-20240802-en
General
-
Target
f9aa107d2a3f52f3bd7d34c47b25f31b_JaffaCakes118.exe
-
Size
154KB
-
MD5
f9aa107d2a3f52f3bd7d34c47b25f31b
-
SHA1
df43fc91bd57bfeae836715b06c75b79724da278
-
SHA256
0bcad82e2e45ecacc5af649e55ce582486ab11d22cab61bee4777afaa3980bfd
-
SHA512
a74add0ba1fceada140c91cfe5da92d3b9ba59a14706a233e8c26da597ed869954be629412c2f7512cde2e64067351b329daa9e1db46effa73947bf09f3c6a67
-
SSDEEP
3072:y22ihA0m3BJP0AruP7P0Cba5EzyrAeejrDO37k8co:tA0m3D0Aro7Pi6jaw8r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1364 BetterInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9aa107d2a3f52f3bd7d34c47b25f31b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BetterInstaller.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1364 BetterInstaller.exe 1364 BetterInstaller.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4504 wrote to memory of 1364 4504 f9aa107d2a3f52f3bd7d34c47b25f31b_JaffaCakes118.exe 82 PID 4504 wrote to memory of 1364 4504 f9aa107d2a3f52f3bd7d34c47b25f31b_JaffaCakes118.exe 82 PID 4504 wrote to memory of 1364 4504 f9aa107d2a3f52f3bd7d34c47b25f31b_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9aa107d2a3f52f3bd7d34c47b25f31b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9aa107d2a3f52f3bd7d34c47b25f31b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\BetterInstaller.exe"C:\Users\Admin\AppData\Local\Temp\BetterInstaller.exe" /affid "recibo" /id "recibo" /name "RECIBO"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5d79b88bab3231ebebd3c6505ab68ce56
SHA13222e8dab740ba1d640cc66a9cd36070969deb80
SHA256d4032354c8ca3b93fd18414d6a7935bcecb18f25534b2259eeaf7d3081ec13ec
SHA512b8afbd52e74d8611714a33bd80a907be8080195bd574ceb0aa8ce44520c9cf6c40ccce4a4db9be0808b8b5a6b7b0fee17ee42f9cca67d69152dd1f1d8ddd99a9
-
Filesize
75B
MD524aaddd7294168f0684b0b2ba851041b
SHA14ebaac859aa7338cb5700c3b3f915788054e8c24
SHA2560e046bdfb2192ec12a0e9ae0ddd76da443f0d291e8a145a506eaafeebaee4ecb
SHA5120374904468bda41c4b0dbb454c4f423554c4ed1aaf217e80596b7be2c821b58a8bb20c8522b5ba20fc270e18392a07be9b248fb163a10fc4724fbf3b091858f6