Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe
-
Size
174KB
-
MD5
046c7f02aba5ca279aef255dab129030
-
SHA1
a7b0d720a5bc675f5eca99bbbd21730194466138
-
SHA256
ddeddd3544ade8f35a31ae35c09d364afd098de828aa6078df215690771e51e8
-
SHA512
8b15cd4871e554f6d96a732766b3b6e65b33a7601702da6db6b6e4e6de929246a98cb13c61c13e0f12a04eba68ed8b74a05ad7da0eda6c1eb8ccd85cadc0f888
-
SSDEEP
3072:ETVp0sZQijqs7GX/W9imZIzcQn055c/3orHlhST8i2bIR:Cp0sNjqs7q/6ZI4iWzLST8RI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 Glakya.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\QZAIB7KITK = "C:\\Windows\\Glakya.exe" Glakya.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe File created C:\Windows\Glakya.exe 046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe File opened for modification C:\Windows\Glakya.exe 046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glakya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International Glakya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2460 046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe 2052 Glakya.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2052 2460 046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2052 2460 046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2052 2460 046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2052 2460 046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\046c7f02aba5ca279aef255dab129030_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Glakya.exeC:\Windows\Glakya.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5046c7f02aba5ca279aef255dab129030
SHA1a7b0d720a5bc675f5eca99bbbd21730194466138
SHA256ddeddd3544ade8f35a31ae35c09d364afd098de828aa6078df215690771e51e8
SHA5128b15cd4871e554f6d96a732766b3b6e65b33a7601702da6db6b6e4e6de929246a98cb13c61c13e0f12a04eba68ed8b74a05ad7da0eda6c1eb8ccd85cadc0f888
-
Filesize
372B
MD58790635d7f040c06cde0feaad64fefc6
SHA1ab277613e4b6857a279354fa90d179c8ae998bc5
SHA256a36beeb14bae7b77c40bd740fd3504c40d437dec0002b6cbf0ad2491db55d82b
SHA512667c4ce294a63800c8deec198b5fc1ac1f0370d1eeecbc378ba9fb4e47873f0c670c239b669598def6cd0eb95c296a858f14f705dffafb8fb2286a2705f47d4a