Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
12c4b96524773c602e59fdd487ae95ef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
12c4b96524773c602e59fdd487ae95ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
12c4b96524773c602e59fdd487ae95ef_JaffaCakes118.exe
-
Size
380KB
-
MD5
12c4b96524773c602e59fdd487ae95ef
-
SHA1
fb036ca4ec78d94aa3104c7b1cfc5fcb7f57ab59
-
SHA256
6ba7fa219c648d7385d9e7f513de997b96f3de04d2d4215210eecf9322eaebfc
-
SHA512
a30d4255f26275ded87d6d634f1a11a5574e08f417d3c05bc1ca7caa6a7706a0d71c442ee2245a999751acac69ffc5c662ae6c53ff23c8fd1cdc18ea39e3ff6d
-
SSDEEP
6144:DM/ImBYdNrj6P3zWWqMWlXJJC7L0X+LgnmvarYLiPu8lBGSOG5FYU:Y/ImmOb4flXvCnJkHYLiP3lBBf5F5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12c4b96524773c602e59fdd487ae95ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2740 2732 12c4b96524773c602e59fdd487ae95ef_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2740 2732 12c4b96524773c602e59fdd487ae95ef_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2740 2732 12c4b96524773c602e59fdd487ae95ef_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2740 2732 12c4b96524773c602e59fdd487ae95ef_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\12c4b96524773c602e59fdd487ae95ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12c4b96524773c602e59fdd487ae95ef_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262B
MD54ddf3bc8ce81f5172784b11dea64bbfc
SHA1b002f5a69783c30ed0170c31b9b2187a77d6e3a0
SHA256d0c7a1c6fe8ad1e52fdb1a41066249e41fdc1762a7684f6c90a971d572e52ca1
SHA512295958128d831eb4a84e06b7600bd16a88233cbaa184ba58f31a857a469565d506aacfb0dfec3640b5c8b3392dfcd7d5c12353a36d4a62bbc194d18c13dc3785