Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
27572ef7794225b99ee2c86b7b6c944c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27572ef7794225b99ee2c86b7b6c944c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
27572ef7794225b99ee2c86b7b6c944c_JaffaCakes118.exe
-
Size
156KB
-
MD5
27572ef7794225b99ee2c86b7b6c944c
-
SHA1
76cce99f821d24d58823a4bcb7f62486964ee6b9
-
SHA256
d6f2eb42de6a62bfdcf49fd1bcb16a2c6ed6ded5d6ba8efeff9333d0256284f4
-
SHA512
1bff9471f4b2db7b73ae1bf37085665a7b4beffdc3973a4b98724e763907635eb4fb885d8f4fff433ff0bd956debdd71ccff31e72ff0f739ce172f9282381dec
-
SSDEEP
3072:g3Co9d8+vMFp8cp3KaVMcv7lzzatYNMCvCXoQDtz:hojc8aacvBfaIGz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2440 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27572ef7794225b99ee2c86b7b6c944c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2440 1356 27572ef7794225b99ee2c86b7b6c944c_JaffaCakes118.exe 30 PID 1356 wrote to memory of 2440 1356 27572ef7794225b99ee2c86b7b6c944c_JaffaCakes118.exe 30 PID 1356 wrote to memory of 2440 1356 27572ef7794225b99ee2c86b7b6c944c_JaffaCakes118.exe 30 PID 1356 wrote to memory of 2440 1356 27572ef7794225b99ee2c86b7b6c944c_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\27572ef7794225b99ee2c86b7b6c944c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27572ef7794225b99ee2c86b7b6c944c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sdfkb.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
466B
MD57612603f03b8b2167a953d20e1e90dcb
SHA180dbdd663322981ebd5c98bfcd6ad84e05d80e98
SHA256f003340118a0cdd323b276d15ac82eb6be809eaaea6f3347c7a3273d2f7568a9
SHA512701494d0a2aecdb50ed4e5dd5ba62cdcd318cee4b7f6c44828f44a4bc263c3d5438742a9b7abcb9c609bbeb94739a25651b695d068f52c29f2b2745f822ce22f
-
Filesize
156KB
MD527572ef7794225b99ee2c86b7b6c944c
SHA176cce99f821d24d58823a4bcb7f62486964ee6b9
SHA256d6f2eb42de6a62bfdcf49fd1bcb16a2c6ed6ded5d6ba8efeff9333d0256284f4
SHA5121bff9471f4b2db7b73ae1bf37085665a7b4beffdc3973a4b98724e763907635eb4fb885d8f4fff433ff0bd956debdd71ccff31e72ff0f739ce172f9282381dec