Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe
-
Size
404KB
-
MD5
02ac073cc153d34db95daff9fef2ccf1
-
SHA1
0eb9e4cff3fa342901394cafe04ddc87a0d6acfa
-
SHA256
e870a918097a2cec36fd0b833a6312c737e3d9d8967b90234fbdcd9e856dd8ae
-
SHA512
b1a95335723b50328ea2af13db6a1ae58c71381bde60be48f04591872b91e45ea1000cf53f11b9f73bb482eb5a8990ed4e8cba1df1aef3f426cb1b80f00d88ed
-
SSDEEP
12288:T8x5JWY/Q7dQDQlHwrUIj42e3SrRWeE8c/u:sYhAljNe3SrvjcW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2008 alternatives.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\program files\ReAlplay\present\alternatives.exe 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alternatives.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2228 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 2228 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 2228 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 2228 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 2008 alternatives.exe 2008 alternatives.exe 2008 alternatives.exe 2008 alternatives.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2008 2228 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 82 PID 2228 wrote to memory of 2008 2228 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 82 PID 2228 wrote to memory of 2008 2228 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\program files\ReAlplay\present\alternatives.exe"c:\program files\ReAlplay\present\alternatives.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404KB
MD5b2a7c7c35c2463b97d6d780247ab943c
SHA11771d27f1c020196e2e23829da10dbb77f3eb0fa
SHA256a9c8093c47cf8b4d09e8311210160122ce67aabf6dfd39674e0460f52dc6d8a8
SHA512ce61dfe0044fa8479dc9cf3732037e612deef7929799a5f88d4bb0e519b0121db32413203ab3dd53fe6cf049256bfe63f442310251078e5623d706f853ca97c4