Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe
-
Size
126KB
-
MD5
fb73d0359f7884e6fd0599ed085c54b0
-
SHA1
11b1fa897ac2d4386271f5ac77a77f5b9162ad0c
-
SHA256
bd636fc134cc19ea72a62da9f15cec2852200d48b4c5092ed71aef0f0b56e084
-
SHA512
8c49354b19a6df01002e3ae7b302b82d5471792868526c6f621be9830ee1536c9ae44454f067915b5eceef56b3fea059a070781e7601e1a98c02857c5876c2d1
-
SSDEEP
1536:xV3Z+6UTS6VZkPuEbTKY6iYeX6GaZcgK3/VACC2yQBcNN7veO8B:xOdGPuEX/4bZcV/VACLcPT
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies agentlog.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 agentlog.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 agentlog.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE agentlog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agentlog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agentlog.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix agentlog.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" agentlog.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" agentlog.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1052 agentlog.exe 1052 agentlog.exe 1052 agentlog.exe 1052 agentlog.exe 1052 agentlog.exe 1052 agentlog.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3396 fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3732 wrote to memory of 3396 3732 fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe 82 PID 3732 wrote to memory of 3396 3732 fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe 82 PID 3732 wrote to memory of 3396 3732 fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe 82 PID 3620 wrote to memory of 1052 3620 agentlog.exe 84 PID 3620 wrote to memory of 1052 3620 agentlog.exe 84 PID 3620 wrote to memory of 1052 3620 agentlog.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb73d0359f7884e6fd0599ed085c54b0_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3396
-
-
C:\Windows\SysWOW64\agentlog.exeC:\Windows\SysWOW64\agentlog.exe1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\agentlog.exe"C:\Windows\SysWOW64\agentlog.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1052
-