Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
04ff24fc2be98e91b556347b5e723232_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04ff24fc2be98e91b556347b5e723232_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04ff24fc2be98e91b556347b5e723232_JaffaCakes118.exe
-
Size
121KB
-
MD5
04ff24fc2be98e91b556347b5e723232
-
SHA1
7512aa0036c28af01a299fa3b9c144a6483b4fce
-
SHA256
d8d36b32fee1f30434e0c98a1ddb6b84a3999b9d0459fba8cf2bc313860a4c51
-
SHA512
6c7b1305bc2ed7521a78168070194bc021c968d005d2c367f6f4d73c7a7435e1e6fe36a63afbbb20c391078f6a24ac33a6aab7074bdb57159793a9cc126507ff
-
SSDEEP
3072:TkKM52nlxCq/IC3r5IGq5hFRZFKX6/QdR5ON1lmSbReH:TkKllx3HJq5NKqI8lm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2220 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04ff24fc2be98e91b556347b5e723232_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2220 2324 04ff24fc2be98e91b556347b5e723232_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2220 2324 04ff24fc2be98e91b556347b5e723232_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2220 2324 04ff24fc2be98e91b556347b5e723232_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2220 2324 04ff24fc2be98e91b556347b5e723232_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ff24fc2be98e91b556347b5e723232_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04ff24fc2be98e91b556347b5e723232_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ntp..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5ae13b1fcd46be02283eef96e3e19c6cb
SHA12edf9d12ffe2f3e2b1a4179cfcf389c6c9d08de8
SHA2565fc14c0b41f07adea3b7633cc9e10217b9c3261aa1bc5791be724b95924041a9
SHA512e55499e876cb35924a11ea5f7dc4a5a544cb311ea37e1d2efa2c7193887e1c19e60dfa3ca566b4ea71ae5a1f4232a3809bb64625805f3c7eb9fa2b5adf506063