Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 10:00
Behavioral task
behavioral1
Sample
12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe
-
Size
2.9MB
-
MD5
12df2774a3b8d8ac19fea508bd02ad3c
-
SHA1
bc81c03e568f8f06657ce07e25885c4e4e44b782
-
SHA256
10d26b45715fc5c41c5a619d69d438daaf43599013a56d6bb808edb9998d95b6
-
SHA512
f039514834fce26c8f1b31f870b3cc56cae00bcfc012095d731558ba42ed35a9df19adc1e2d951c291e580beaa06177b9d421b45b287e2c10d104c79eb8ac7e1
-
SSDEEP
49152:+Vokgh9SXvRaZIcDjT56VP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:7AX5a+uUgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4776 12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4776 12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3328-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0008000000023455-11.dat upx behavioral2/memory/4776-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3328 12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3328 12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe 4776 12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3328 wrote to memory of 4776 3328 12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe 84 PID 3328 wrote to memory of 4776 3328 12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe 84 PID 3328 wrote to memory of 4776 3328 12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\12df2774a3b8d8ac19fea508bd02ad3c_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:4776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5c75e6108ca8d1d6484499b6ae8b51225
SHA16c5d39ae09197930ecf47627326bb27c907204df
SHA25600df09426987df42dda94cee6cf80bf9a1dd15a88f21e05f8f99d0a6ae9d9e71
SHA5121581a3552cf7f6a20dc4abcbdf09fffdc916496aef92c37c4f3a0b968202fd1c7567c4819740aa3d761e41f79a876207e0a10a9800ceace288c24401190bd366