Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe
-
Size
127KB
-
MD5
ff5f36bf9fc4dbdd66f60889380fc65f
-
SHA1
35ecb1e48f0fc8849768d7bef789546ba4d1d659
-
SHA256
7629bd60ebf2d6c60e861c463c1eca3e4a3d9e719934010ea560028b304c47f9
-
SHA512
7bb178d311b1bdf6100734ebc2b4ff8e42786117c2fe34ab4139775bcccf97ed6dd8a6a98b93b2dfb52117e94cfdd5b64a6c982bfad534542324ea1a6902474f
-
SSDEEP
3072:1GHzFEhTHHIUjCgArLEZXApH3UHE360bSYUeQF4rzB:1eFWHIU2Y9KEHE36uSA
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 idebugmheg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE idebugmheg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies idebugmheg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 idebugmheg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idebugmheg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idebugmheg.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix idebugmheg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" idebugmheg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" idebugmheg.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4332 idebugmheg.exe 4332 idebugmheg.exe 4332 idebugmheg.exe 4332 idebugmheg.exe 4332 idebugmheg.exe 4332 idebugmheg.exe 4332 idebugmheg.exe 4332 idebugmheg.exe 4332 idebugmheg.exe 4332 idebugmheg.exe 4332 idebugmheg.exe 4332 idebugmheg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4480 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3932 wrote to memory of 4480 3932 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe 85 PID 3932 wrote to memory of 4480 3932 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe 85 PID 3932 wrote to memory of 4480 3932 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe 85 PID 960 wrote to memory of 4332 960 idebugmheg.exe 94 PID 960 wrote to memory of 4332 960 idebugmheg.exe 94 PID 960 wrote to memory of 4332 960 idebugmheg.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe--461d39982⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4480
-
-
C:\Windows\SysWOW64\idebugmheg.exe"C:\Windows\SysWOW64\idebugmheg.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\idebugmheg.exe--917d78392⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4332
-