Analysis
-
max time kernel
97s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 12:17
Static task
static1
Behavioral task
behavioral1
Sample
0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe
-
Size
136KB
-
MD5
0a9ebe4d50cd2f1ff0254509d6c4eaa0
-
SHA1
ada0d38c6f03ec8b5d84851e4bee6dcd587fd937
-
SHA256
522157df7fa767b44ffaf178af86c7eb37b4fca96a9d18912031e974794b0c86
-
SHA512
c4f0b0d0cd1395f153a4f74cbb0b6951af46d3c97d30b1b26ae95cb554a590126cbab886af8185129d3e163bbe8ce9ddb98570a95768648ec44133d03b891beb
-
SSDEEP
1536:DY+gJL9KHikLALc9aHQQbo5/YnuNqpK5TVF+b9bOpLMynIEe3vS7Gmx4qOqSai9v:LRbg2RauD5RF+b8LMMIEe/IG6zNSaix
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\240631359.bat 0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe File created C:\Windows\240631484.bat 0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4068 wrote to memory of 2660 4068 0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe 82 PID 4068 wrote to memory of 2660 4068 0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe 82 PID 4068 wrote to memory of 2660 4068 0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe 82 PID 4068 wrote to memory of 4660 4068 0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe 84 PID 4068 wrote to memory of 4660 4068 0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe 84 PID 4068 wrote to memory of 4660 4068 0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\240631359.bat2⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\240631484.bat2⤵
- System Location Discovery: System Language Discovery
PID:4660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99B
MD5db6bdca3baf85d3fb83827d56de7b90c
SHA15fe326fe568da843f3c37f9b7538681372e096ce
SHA256bd8545b14b11fc161a6508d0e95d8edda8d408de12661b6ff68b4127b2a6c9bd
SHA512231a7d013fa92dfc568ec34b87b8e81c3aa98aa1d7107b7ccc87bb43ddc78e533bfa6855ed7b84c4688380d90983906a6981d5eff605ab15e1ab66903a767aab
-
Filesize
219B
MD581e7a0278bae79ff8f8d9ba4834ddaf9
SHA1841110efc25a58c4ddf019d7a07624a07d336aa2
SHA256d4a31bae5a40263a9e878175b0783b6e67858538293185daebb8f8599d09f033
SHA512f0a7af4dab3aaa7341341e831fb86e474235f0eea816b3362642bfea956a7e6421fb7cc9e576da67f22f6f407f2006c4efa8a6c617e317eb2ca9513513badb0a