Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 07:31
Static task
static1
Behavioral task
behavioral1
Sample
002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
002c617a8f6ace3962a53d82cc3ad25c
-
SHA1
ff80895517418679be99a1efd6883897fec85f4b
-
SHA256
62ce8dd8e2efdecdad6ec5e83ec9db1361ee0362bf5f2609ba6f575fb9942115
-
SHA512
6af3df336b068b0221a178d5e57a3aff56f5a886bc6425f4d81b84b8faed34325ef1a8bf504bb98e4dc316737a2b73e81529975f9ca7ef7a6a2420e8227a0d12
-
SSDEEP
49152:HVyWZ81TOVstRbMsRTzRUQX8W6ZBEG6Pyt:gWKNRbMsZRvXAZEat
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4984 setup.exe 1176 victoria43_cn_setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language victoria43_cn_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4984 setup.exe 4984 setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1176 victoria43_cn_setup.exe 1176 victoria43_cn_setup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1056 wrote to memory of 4984 1056 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 87 PID 1056 wrote to memory of 4984 1056 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 87 PID 1056 wrote to memory of 4984 1056 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 87 PID 4984 wrote to memory of 1176 4984 setup.exe 88 PID 4984 wrote to memory of 1176 4984 setup.exe 88 PID 4984 wrote to memory of 1176 4984 setup.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\g82A76\setup.exeC:\Users\Admin\AppData\Local\Temp\g82A76\setup.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\g82A76\victoria43_cn_setup.exeC:\Users\Admin\AppData\Local\Temp\g82A76\victoria43_cn_setup.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4372,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=1036 /prefetch:81⤵PID:648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
583KB
MD55d2f51fbb661b3971a742386ded258b6
SHA1a4895d7cadbe2c5a2a71272ba3f6250f7f6b6cba
SHA2564ca700b3824472591caf5dde0119047decfa703a0b2556ac756bef3e5d4e4327
SHA512b2b6bab4f7b0a0ede7634f177200a695dc28e5cb928b008b47c3b9020b4cbeb30f81769bb90178fd6ea98f1002a1fe61c13594bd2495c418ee1444b0d1df25bb
-
Filesize
699KB
MD5eeac65dfca940a11bce198fb04f67bd6
SHA1f21dce2b865e057dc959bbd35bdd3edb0e26c9dc
SHA256a1df7e91ddd4c7f3beef918207421594d4741bca270671590e1e3e36dca94fd8
SHA51267c7ff2931af074571564c0e829e81735306b898b20e32f67c6cb9620a2c9d41abd8b68ab6dc9b4b1b4b6856052cc3c299abc7a0d937d3554176a079d2f84955
-
Filesize
217B
MD56b0142abf5ada49604c5258608b02f3d
SHA1c2d73805d4ab56b9a51a915d8d58c629fee69425
SHA25611fd61dbfd2b1bb246f2c45f326acd94b17b9e5bef5a362e4fe0a14b68e37f2e
SHA512d2bff53a1d047f410b147c436b6cb51e5bcbcb5da4e4891967af7c6403553b859f059f1f97a6d428a064e07f63d154584506d8b3223ae7a70919d356eecb8ca9