Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 06:42
Behavioral task
behavioral1
Sample
f9eaec394fa40cc9efdc540d1c7d86c3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f9eaec394fa40cc9efdc540d1c7d86c3_JaffaCakes118.exe
-
Size
372KB
-
MD5
f9eaec394fa40cc9efdc540d1c7d86c3
-
SHA1
0ef50330ae08b157da166347ae9376a2d19d62cb
-
SHA256
14a2cbfc7ac478a9b271d0af0ea391fed6336ffa37ee72fe2266c957ea39a20c
-
SHA512
4cdcad9023c5f05b46e853df5f5bdecf9db7facac166d2a6b68d1cbb6132ef97ea06653c491f8b2aa67d089509307f1d9b4bd7a11004591275c8681cdb282be2
-
SSDEEP
6144:GuJKq3G5Li4VSaIHVhfo6YiBshMPWsAMy6WqzK2ZhlGo8ZcITva+jbpvNU+AbDdq:GuveLlVhGhwwBU+Wsg6WqZZ/GaR+jh2g
Malware Config
Signatures
-
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2724-20-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-21-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-22-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-23-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-24-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-25-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-26-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-27-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-28-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-29-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-30-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-31-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-32-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-33-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral2/memory/2724-34-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/2724-0-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-20-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-21-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-22-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-23-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-24-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-25-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-26-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-27-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-28-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-29-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-30-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-31-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-32-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-33-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2724-34-0x0000000000400000-0x0000000000498000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9eaec394fa40cc9efdc540d1c7d86c3_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 f9eaec394fa40cc9efdc540d1c7d86c3_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5428d963eb537ef0682d1f158b5e3a87a
SHA1b802a3e74895428fc4edcf7da78a7ca4a48df985
SHA256060a58583fe72c7e254f20774b7b9109f383d8dfba1c130be9f90069b1d66c2b
SHA512f2bcd915b2a20d21ff0d5fceb28bb60966b39430b8303b1cd213f3bce12cdd556e0303d8d006286b08d7d40ce2f20dbc4b5d6e8c1bf6980323ffbde6ba5f5218