Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe
-
Size
39KB
-
MD5
fb3233e047a5c964e2d06a5390a3c297
-
SHA1
bd54ce68f0dbb2b71ccfd11822809f21707b7802
-
SHA256
7b838ef96a65e9aba4b890c996c8f2f730b6e5c5b904f9460f58a55c49138564
-
SHA512
30984c8ddd049fb366aee270477d655dd43be1df3613c42d8e1f094a002433ae8e4fec80a2fabfe1b3eef71b92abc3f0808b3aaa2b743f6ad34c967bbe1e2b45
-
SSDEEP
768:i93myxq6QUNN7e23rRHUFdVayJy1hzvuMX4bdcGPGdMHblQ7:TMq6QUXvhsd61hDudvPGKHb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2528 Delete.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Delete.exe fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Delete.exe fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Delete.exe Delete.exe File created C:\Windows\SysWOW64\DreamweaverDel.bat fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delete.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3616 wrote to memory of 2528 3616 fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe 84 PID 3616 wrote to memory of 2528 3616 fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe 84 PID 3616 wrote to memory of 2528 3616 fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe 84 PID 3616 wrote to memory of 1648 3616 fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe 85 PID 3616 wrote to memory of 1648 3616 fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe 85 PID 3616 wrote to memory of 1648 3616 fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb3233e047a5c964e2d06a5390a3c297_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\Delete.exeC:\Windows\system32\Delete.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\DreamweaverDel.bat2⤵
- System Location Discovery: System Language Discovery
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5fb3233e047a5c964e2d06a5390a3c297
SHA1bd54ce68f0dbb2b71ccfd11822809f21707b7802
SHA2567b838ef96a65e9aba4b890c996c8f2f730b6e5c5b904f9460f58a55c49138564
SHA51230984c8ddd049fb366aee270477d655dd43be1df3613c42d8e1f094a002433ae8e4fec80a2fabfe1b3eef71b92abc3f0808b3aaa2b743f6ad34c967bbe1e2b45
-
Filesize
212B
MD598379108070ae2cfc0e2c66950095fa8
SHA111a4e81c19b7187be18362d7f2f04c71fbdcf94e
SHA256b47452b3e6858c9689f7c15b00bb9af1014c1ebdd44556ebcf6b1d353ee0bcee
SHA5127b405b128127d403eebe0207f80e53d68e720bfa255e6b85bf4b71286670b1dba136afe52a08dc6ab46fa5de0347f3e0e411dcebe839ff83efa5b77c78c07f5a