Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe
-
Size
496KB
-
MD5
f9d16532b3bb87bcfa272a1ed8055235
-
SHA1
1174cc1a615db423c109dde0195253c9e8114fd9
-
SHA256
3ced56a36e33a42815e42e5da3b61900867a9157059e996f7d89c1bb9c12b6f9
-
SHA512
f261db3b1a8fa541e12b021a4c7ea1d11de6d2caccd0b7c29d05c1fc60037a68b3e59e727a23047783177db37b03caf4f38aa95b79433ac0a9b21cadca5e4c70
-
SSDEEP
6144:K61sCSSp+ibh0uo44X1pKEZH1F0hJjPPuM:KUsRSp+ibh0uth0HkjPu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsdattrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsdattrib.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2344 f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe 2344 f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe 4972 f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe 4972 f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe 4472 tsdattrib.exe 4472 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe 2312 tsdattrib.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4972 f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2344 wrote to memory of 4972 2344 f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe 82 PID 2344 wrote to memory of 4972 2344 f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe 82 PID 2344 wrote to memory of 4972 2344 f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe 82 PID 4472 wrote to memory of 2312 4472 tsdattrib.exe 84 PID 4472 wrote to memory of 2312 4472 tsdattrib.exe 84 PID 4472 wrote to memory of 2312 4472 tsdattrib.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9d16532b3bb87bcfa272a1ed8055235_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4972
-
-
C:\Windows\SysWOW64\tsdattrib.exe"C:\Windows\SysWOW64\tsdattrib.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\tsdattrib.exe"C:\Windows\SysWOW64\tsdattrib.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312
-