Analysis
-
max time kernel
141s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe
-
Size
65KB
-
MD5
fe15f2153557fd74925e11471e3a996f
-
SHA1
b2919e8e03a3a0649f43b38dfded63ee8b092f9b
-
SHA256
92d549ead3ba0f83e8ee3f5a134f0d690dab4805078a44b9ca9fe8046075c953
-
SHA512
5b18d39d42234c7da45ad1b0f2e1e7c7118022078027bb35ad1099ad57727917e97ff2f10bcfa22c107df7eebd5b5565eadf6064bf4c50b4016464d80b1d3d36
-
SSDEEP
384:/TnWO+7OnCyU8aVt6UFcM/K6KQ15fD9CYoXgeKMhn21xD/S21xJ+qOeboYXeRxru:/SKzniQFXVgK21xieVNG41szy
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1932 maxmin.exe 2252 otopark.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\maxmin.exe fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe File opened for modification C:\Windows\system\otopark.exe fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otopark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language maxmin.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3468 fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3468 wrote to memory of 1932 3468 fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe 82 PID 3468 wrote to memory of 1932 3468 fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe 82 PID 3468 wrote to memory of 1932 3468 fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe 82 PID 3468 wrote to memory of 2252 3468 fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe 83 PID 3468 wrote to memory of 2252 3468 fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe 83 PID 3468 wrote to memory of 2252 3468 fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe15f2153557fd74925e11471e3a996f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\system\maxmin.exeC:\Windows\system\maxmin.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Windows\system\otopark.exeC:\Windows\system\otopark.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD54c3a673ec912d5f289118525d5d904b6
SHA12eeb737cf1d7b7d87f801742fe45610d5e8eca32
SHA256deff3fef9df0bb2aa1c4cfc45fbfb745732342bec532916b042ab5677bf21516
SHA512420ce70d33cb2f857b8899ad8e484268487d3a886ec60f9b9248f57abf27b7423866d2a2f0c343c66535d99b3621f92a8c429f77e51a3f239f4b5a436368a1dc
-
Filesize
16KB
MD5fd78a8b2801c8c91b04c1c3f7b948885
SHA13cbe34e84c8c2a781f7d64e78609b20b4bce12d9
SHA2563e5105752ce01989bef0d791c2f8b95b1063cc9d302986d919d14df151f9a6ad
SHA51294a0c2c09af10fcb479039ce77af2ce55bbacc5d29f7e37852caee10210f69464735566e400c329459b6f1fd31637b5316204da851f4d4a990d535f237e36aca