Analysis
-
max time kernel
93s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe
-
Size
60KB
-
MD5
11322eff03335a7d851f5f179e96efeb
-
SHA1
7d1eeaf869874969f29099e91b84a27e5b335e59
-
SHA256
be68bd4dc11a5c5b1dec5881a3c9945ed6c76acc72f5dc75dea43a509fcc1815
-
SHA512
434acc8ff0399f76ca848919b94391cdb6f47efc756bf5ba6c7f1992ffb95abf76354108bc05ffd0e7339f705786b74da946dcafb75ae667aef34148cb23582f
-
SSDEEP
1536:YwpW9UaDLSvuQUE6UdYwiSSgOkflWWkqY:5W9UaDuvlwU2KSgrcWkqY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3108 wrote to memory of 2516 3108 11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe 82 PID 3108 wrote to memory of 2516 3108 11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe 82 PID 3108 wrote to memory of 2516 3108 11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe 82 PID 2516 wrote to memory of 5044 2516 cmd.exe 84 PID 2516 wrote to memory of 5044 2516 cmd.exe 84 PID 2516 wrote to memory of 5044 2516 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt65502.bat "C:\Users\Admin\AppData\Local\Temp\11322eff03335a7d851f5f179e96efeb_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s /u C:\Windows\system32\OGACheckControl.dll3⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5348a5cd2437c95362f7cb38195486b5e
SHA1ec57d799dfc95f4d0bfd83564f158f01bca87713
SHA256f1316f08e982c0222c023618fac4c3e32a9971298b8cf65bd543942ce590b2f0
SHA512ac6df0c40d227f18b2b6f79339cca4e0c53a863371d58ff53e0ac8c3e29a3b397c210c8f1de89ca4389d8c45f2fd37c99fd93f9d8066d2ffe851e6c240cd3f5b