Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 16:33
Behavioral task
behavioral1
Sample
0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
0b96a0b9e6831e86053555bc0c80d402
-
SHA1
75aaedfc66f46a6fe0373edfc79a9017875abe28
-
SHA256
629561c9d9a3e1754e2226610ec14e80f11239776d5a6260c8705e9683165036
-
SHA512
1b2573245c7da78ced0704f2424b92d346d5be9c9d2256786c028db449f11cde1f34d8ba3b452a6bce49e655e3008eb1a44a918531515901395a0e4b7dd3c5bc
-
SSDEEP
49152:ztRgHFVlxtaG9+IVeRGFnissQHGG4ay3:zvaVlxh/AX3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2252 0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2036-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral2/files/0x00090000000233cc-12.dat upx behavioral2/memory/2252-20-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2036 0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2036 0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe 2252 0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2252 2036 0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe 82 PID 2036 wrote to memory of 2252 2036 0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe 82 PID 2036 wrote to memory of 2252 2036 0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0b96a0b9e6831e86053555bc0c80d402_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD58eba8a290ec4c08583d1e6e0b78d25ce
SHA1dd93c18256c1a49d2348d7b3022908927870240a
SHA256daa4914a00e7da13916a192664e5fc24429b70dbc3abf9d775a69caaee419e73
SHA512fdbc16e29998e72ee225dc9fb578b9c11588114d06d26c9ed2644fd90a850e2c5cbedaccd02759eb4c4b2af42c12150d7a49fc5e0c85fa93ca62521e38eadca8