Analysis
-
max time kernel
11s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe
-
Size
69KB
-
MD5
fa89415a44271b6f7ebd078243b2fc97
-
SHA1
946c8e18fcebdd004a3c9ad491dec389dc3ea77f
-
SHA256
25b7ebfaa0f6b84a0131ed4e526696193b344341d5c53982eeb9040d06aff33b
-
SHA512
6bd30c2bb2f38dc112bd62493efeeb0fe8ec497215965083f2b847307501b894112cbde32803d1d9e9c8251cfb9c4ec9fed5b3e3bcf70c5f1f4df60e227478df
-
SSDEEP
1536:QYhN+JA33e8kzKV+dMKgk2WkX7kUUYsZuGqq+p:Qa+JA3OFKV+i3Wky5uGkp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2756 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2756 2088 fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2756 2088 fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2756 2088 fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2756 2088 fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Evj..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD50397386a9949080f07d85a7758ec2ec8
SHA1fa576486babaf664b15e7549968bf4b9c3b6df0c
SHA256f0c564d54efc85ef1e4905ccf7d444ef3e3ff0282f1c5d16f63f93353b2ec93c
SHA51239a08f0803433f57bb0ce48a051aaa13b7a7b069da05fca7fb0cf2d98fe672c78fbb0c773c418536c1f30738bab6bb005eaf8d9617c80cd2e134c361c3c4b9fe