Analysis
-
max time kernel
95s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 13:24
Behavioral task
behavioral1
Sample
138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe
-
Size
2.9MB
-
MD5
138637d77b1a78e0616da608e76bad6e
-
SHA1
12cb624b4bef998e1346354dd6ac2258612c6163
-
SHA256
5f51d19caf01812b3a6eea873a9e806bc6ae7c1a7d62938f00ff75bd408a1980
-
SHA512
ba9cd696e72ab8fbdd76ffddf434f0c7060743b4ab81864a8521439e4343e9e28f8c3f0d06c0576f64b3f2e840c811427cd1e2bb65cd9f219de011c4a2853ebd
-
SSDEEP
49152:nfr9W7/zcIQp0MY2TrFsF8fxlP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:w7/zccMY+F5lgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2196 138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/212-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0008000000023459-11.dat upx behavioral2/memory/2196-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 212 138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 212 138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe 2196 138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 2196 212 138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe 82 PID 212 wrote to memory of 2196 212 138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe 82 PID 212 wrote to memory of 2196 212 138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\138637d77b1a78e0616da608e76bad6e_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD50fa2ea62f0af0f81d921c05532cde920
SHA1dccf83338599854f0c37e47f40be4c9a8ef5490d
SHA256e9e6243ec4fb05b06a660856e04a28cbe8e6513f5cc257122df9143f8c3038d9
SHA51205553d3f4f049d58bd644c5d1e5862333f01ecea24db1ffcebaa4b269c26efe7dc2c5f41f7097e92517a54a5c1d79c338e5cd9621f6238a235992f734ccdea7c