Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe
-
Size
60KB
-
MD5
11322eff03335a7d851f5f179e96efeb
-
SHA1
7d1eeaf869874969f29099e91b84a27e5b335e59
-
SHA256
be68bd4dc11a5c5b1dec5881a3c9945ed6c76acc72f5dc75dea43a509fcc1815
-
SHA512
434acc8ff0399f76ca848919b94391cdb6f47efc756bf5ba6c7f1992ffb95abf76354108bc05ffd0e7339f705786b74da946dcafb75ae667aef34148cb23582f
-
SSDEEP
1536:YwpW9UaDLSvuQUE6UdYwiSSgOkflWWkqY:5W9UaDuvlwU2KSgrcWkqY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2452 1404 11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe 31 PID 1404 wrote to memory of 2452 1404 11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe 31 PID 1404 wrote to memory of 2452 1404 11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe 31 PID 1404 wrote to memory of 2452 1404 11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe 31 PID 2452 wrote to memory of 1560 2452 cmd.exe 33 PID 2452 wrote to memory of 1560 2452 cmd.exe 33 PID 2452 wrote to memory of 1560 2452 cmd.exe 33 PID 2452 wrote to memory of 1560 2452 cmd.exe 33 PID 2452 wrote to memory of 1560 2452 cmd.exe 33 PID 2452 wrote to memory of 1560 2452 cmd.exe 33 PID 2452 wrote to memory of 1560 2452 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt00714.bat "C:\Users\Admin\AppData\Local\Temp\11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s /u C:\Windows\system32\OGACheckControl.dll3⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5348a5cd2437c95362f7cb38195486b5e
SHA1ec57d799dfc95f4d0bfd83564f158f01bca87713
SHA256f1316f08e982c0222c023618fac4c3e32a9971298b8cf65bd543942ce590b2f0
SHA512ac6df0c40d227f18b2b6f79339cca4e0c53a863371d58ff53e0ac8c3e29a3b397c210c8f1de89ca4389d8c45f2fd37c99fd93f9d8066d2ffe851e6c240cd3f5b