Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 18:00
Static task
static1
Behavioral task
behavioral1
Sample
ff134d6a654fc730ec6e79e13670023a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ff134d6a654fc730ec6e79e13670023a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff134d6a654fc730ec6e79e13670023a_JaffaCakes118.exe
-
Size
696KB
-
MD5
ff134d6a654fc730ec6e79e13670023a
-
SHA1
1099f6cfd3107e5dd75fa2a1483444e1987fbced
-
SHA256
43558933d3cef2804c3861726cb21facd3e682cf02a4c5b05a0464a146fe79ae
-
SHA512
15a1e29becb81fee164c03203ba4ad568a41061c063c7a1826dba9f08c1775f01a2625fb3d3f72f41eeb156cf38e5f4b9d948cc7b33251b48fd5f75efd16b75e
-
SSDEEP
12288:suw1b99On23rHuJxYqK+hN6FRcuZYJtwnMsnMt87zIg5cvYYtJZGeRLxS:sJ1J0n276/6FRcuZMKVa87Ug5kYE75Rw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1512 Stp8B0A_TMP.EXE -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Wise Installation Wizard\WIS7BEFF98FEE9A4FC4A17632B3E15143E3_0.MSI Stp8B0A_TMP.EXE File opened for modification C:\Program Files (x86)\Common Files\Wise Installation Wizard\WIS7BEFF98FEE9A4FC4A17632B3E15143E3_0.MSI Stp8B0A_TMP.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff134d6a654fc730ec6e79e13670023a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Stp8B0A_TMP.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1512 1576 ff134d6a654fc730ec6e79e13670023a_JaffaCakes118.exe 82 PID 1576 wrote to memory of 1512 1576 ff134d6a654fc730ec6e79e13670023a_JaffaCakes118.exe 82 PID 1576 wrote to memory of 1512 1576 ff134d6a654fc730ec6e79e13670023a_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff134d6a654fc730ec6e79e13670023a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff134d6a654fc730ec6e79e13670023a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Stp8B0A_TMP.EXE"C:\Users\Admin\AppData\Local\Temp\Stp8B0A_TMP.EXE"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.2MB
MD59ce5d94df1825b37a522e3c777dc5cda
SHA15bfcc4b681ab1e18146c8f26ae4f1521bddbcc03
SHA25698c6f23f926572b26aab5f436368829fbaf95b6a373a8d2f882b9eca248e8c51
SHA512893ff2a780f02162ea329ac89e50db0e20254204a17cfd4599b78594d882e33fb04e54b3dc871ef0e371cf245e34ebd5fb03bb221e56605639a0d2ee69a873bc