Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
0f864a602248e324f968c20797dc424f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0f864a602248e324f968c20797dc424f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0f864a602248e324f968c20797dc424f_JaffaCakes118.exe
-
Size
125KB
-
MD5
0f864a602248e324f968c20797dc424f
-
SHA1
66e4c9b22a438cba0bd87e992f14949f767ebc9a
-
SHA256
6b200041162cba2502b54124d9c4dbec54b26112e176959ad6c0ac5d63deaff2
-
SHA512
3f77f827cac94a23c5d7045ced40d91fec957be263cbc608fae3297246607465901542c74f418b99eb256c17532d0109fc3171b445a79ec673974e2244ed7a67
-
SSDEEP
3072:EJgwBIxhn+dz7diTqkGqcZBUPs7dHNnu3lAzyDJkluJfBd8s:EuwWx8fScnUPey1BtB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3684 Glycya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 0f864a602248e324f968c20797dc424f_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 0f864a602248e324f968c20797dc424f_JaffaCakes118.exe File created C:\Windows\Glycya.exe 0f864a602248e324f968c20797dc424f_JaffaCakes118.exe File opened for modification C:\Windows\Glycya.exe 0f864a602248e324f968c20797dc424f_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Glycya.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Glycya.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f864a602248e324f968c20797dc424f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glycya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\International Glycya.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main Glycya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe 3684 Glycya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4668 wrote to memory of 3684 4668 0f864a602248e324f968c20797dc424f_JaffaCakes118.exe 84 PID 4668 wrote to memory of 3684 4668 0f864a602248e324f968c20797dc424f_JaffaCakes118.exe 84 PID 4668 wrote to memory of 3684 4668 0f864a602248e324f968c20797dc424f_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f864a602248e324f968c20797dc424f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f864a602248e324f968c20797dc424f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\Glycya.exeC:\Windows\Glycya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD50f864a602248e324f968c20797dc424f
SHA166e4c9b22a438cba0bd87e992f14949f767ebc9a
SHA2566b200041162cba2502b54124d9c4dbec54b26112e176959ad6c0ac5d63deaff2
SHA5123f77f827cac94a23c5d7045ced40d91fec957be263cbc608fae3297246607465901542c74f418b99eb256c17532d0109fc3171b445a79ec673974e2244ed7a67
-
Filesize
390B
MD5a3257e6399e6a4e689c61c93ae802fd3
SHA137c74544164d551bdb3b9a48e732505e8f0f3216
SHA2565de52701a5d5877d18aaa6208df8b201d176685458f16062073ca43ab02cf41e
SHA512b5940a6834a73451cddc7cd0163872a35fcd691bb71720ae9e20121aa60d5af44261881c0e480af3485826e9c90bc093666717d1fbc76f6fc41947b07a95d65d