Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
fd1b2a4a2cbf02e48b2509a13fa854b3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd1b2a4a2cbf02e48b2509a13fa854b3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd1b2a4a2cbf02e48b2509a13fa854b3_JaffaCakes118.exe
-
Size
450KB
-
MD5
fd1b2a4a2cbf02e48b2509a13fa854b3
-
SHA1
142e7e95a8e16fcabe7046dc13cd8e479f198821
-
SHA256
2904ca0574e066cefc3a03e2f060bdfbafa689b5db1e343435ba8a4fec60c5a2
-
SHA512
f103daa820de07c96dd095290c6602464d8f044685029023fce0c6f9e286406a062c58bbe0ea919acf28c94a5409b3a366392085e6acee9f89029d6e7791c6fc
-
SSDEEP
12288:JGwqYkh0gfv/galLhzPc0MPAUMCa5bfom5qpILjQ:NqZnRPc0MPxza5bQm5qKL8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd1b2a4a2cbf02e48b2509a13fa854b3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2384 2084 fd1b2a4a2cbf02e48b2509a13fa854b3_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2384 2084 fd1b2a4a2cbf02e48b2509a13fa854b3_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2384 2084 fd1b2a4a2cbf02e48b2509a13fa854b3_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2384 2084 fd1b2a4a2cbf02e48b2509a13fa854b3_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd1b2a4a2cbf02e48b2509a13fa854b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd1b2a4a2cbf02e48b2509a13fa854b3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a$$.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159B
MD5e30d8107bbd0bfb95decc68775d0935c
SHA1a30d6a8bdbcb261c378a601a5becdac0f7e061d8
SHA256918a3c644c444250b1a84ca38bce71350e12b4a0bed20f9d791deaace2ce33d4
SHA512d72ba4a72e254b66bd6e5acb35e5c54577a1e5d408207984f9e63fd08b08a8fc0cc4741418b692c9e5c088c49bd3aca42dd190eb58893d3261340152c1b834f2