Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe
-
Size
51KB
-
MD5
ff831fbfd28a7685e9ef8199076c1a5c
-
SHA1
f11ff44f9db37aa2e51a786c8f8785859080556b
-
SHA256
871dc016c53e3a6753c3219d9983a54eaead77180b9d219caf19cf5e14ea0e8f
-
SHA512
698a7f5736d9665c39f4e8ccc6bed4d0a8674cc1496fc04412bbc51b2f2964df35d0bb0ab808a57901198012989741ad98488eecfd65ccba833974eebc73435d
-
SSDEEP
768:qXReXBwKwDaTV19VFG5W3yv2GeQOIYz3l3oHpvp9Prn4phXeUvN9l8X0h5X:YwTv9u55Ze8YKpBN4PeUvyu5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4496 Win32Cam.exe -
Executes dropped EXE 2 IoCs
pid Process 4496 Win32Cam.exe 4936 Win32Cam.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Win32Cam.exe ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe File opened for modification C:\Windows\Win32Cam.exe ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Win32Cam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Win32Cam.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe 4936 Win32Cam.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4496 4636 ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe 82 PID 4636 wrote to memory of 4496 4636 ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe 82 PID 4636 wrote to memory of 4496 4636 ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\Win32Cam.exeC:\Windows\Win32Cam.exe -s "C:\Users\Admin\AppData\Local\Temp\ff831fbfd28a7685e9ef8199076c1a5c_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Windows\Win32Cam.exe"C:\Windows\Win32Cam.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5ff831fbfd28a7685e9ef8199076c1a5c
SHA1f11ff44f9db37aa2e51a786c8f8785859080556b
SHA256871dc016c53e3a6753c3219d9983a54eaead77180b9d219caf19cf5e14ea0e8f
SHA512698a7f5736d9665c39f4e8ccc6bed4d0a8674cc1496fc04412bbc51b2f2964df35d0bb0ab808a57901198012989741ad98488eecfd65ccba833974eebc73435d