Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118.exe
-
Size
147KB
-
MD5
f9bb4ca8c22f4c0c63cb1c95e08f9496
-
SHA1
eb2ece19537c56e18a1a3345ff09f2daa8e4d5ab
-
SHA256
2654a239ecb9798db314df2a52b05a5f556faf65d52a716533ecf33ea856e19f
-
SHA512
bf8ac9ec867b3e807ea702d16ddaad9c7ddbd71a91061e9f0b37a1f674f781b95803351c1446eec7515b63900a107f86e04f0eb11fb70fe74f3e2c7c5aee1cc5
-
SSDEEP
3072:z5Rfr1ZZpFhVpnEpGXIvDbKfn4YO6P6morL3Atm3TJ4Dl:z5tr5BVFENbbKfTHtm3TJ4D
Malware Config
Extracted
pony
http://sam-latrilogie.com:8080/pony/gate.php
http://loceanic.fr:8080/pony/gate.php
-
payload_url
http://propasmanagement.com/qTNc.exe
http://toffanoseventos.com.br/EFcT.exe
http://www.graficasalli.com.br/AqnAaH.exe
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 424 wrote to memory of 856 424 f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118.exe 82 PID 424 wrote to memory of 856 424 f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118.exe 82 PID 424 wrote to memory of 856 424 f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Local\Temp\f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118.exe"2⤵PID:856
-