Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe
-
Size
224KB
-
MD5
fdd8b6f7aeb0bc74b71e24ee52903e14
-
SHA1
cd8953e6b8337ef2a08b29a6fb62fd6dd61e2af4
-
SHA256
d23c0881090931bce141ebe9a469e9688b5111bbc8700b28febacba45b2aeb28
-
SHA512
b03db2f9476be3b9c869b9b538e90c3daf25e3d6a7e0b2d4afe2851a0505acf255e2da942d08a0c7ea6472ee21d496e7c9e30c8478dddf5a9a18b492357084db
-
SSDEEP
3072:JFKGRvAVOcLUDHNPRXTv86texGTwkhzgYR72l2pK6eaWb35DFU9IGV7r:KGRa+vTTYx9F2II
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2088 2656 fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe 28 PID 2656 wrote to memory of 2088 2656 fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe 28 PID 2656 wrote to memory of 2088 2656 fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe 28 PID 2656 wrote to memory of 2088 2656 fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe 28 PID 2656 wrote to memory of 2088 2656 fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe 28 PID 2656 wrote to memory of 2088 2656 fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe 28 PID 2656 wrote to memory of 2088 2656 fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdd8b6f7aeb0bc74b71e24ee52903e14_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Urb..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD521bee05108108f22c975d2bb33371442
SHA1de7cede8ff8a1d2dd43a35f4777d04dd23051559
SHA2562f773271131d9927c6518c710279e7725b47252ede96b58b2e4959ed5ba68c20
SHA5125ac0479d037d38c3402adbbd194e842fc15692c17e2ce719c383eb841995eec3f352fbc0b687f57313a04919861af6f4f7b382f8382d686f01744ea1eac3762e