Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe
-
Size
112KB
-
MD5
279557500722a4c6b44a6310628cb75d
-
SHA1
3bd37e9ddf2680e3ee705e0bb7f87fdf52433131
-
SHA256
9dc6949643aaed62f4b37e2d5828b13ce9324880392b198124ec7683dffee13a
-
SHA512
8ea5a3d06037d674c373ea165d135e90fab0d14b73f19146c012bdd2a275ff3ff4ef03dea7743f0293650cab38df927983241cbd9038597e125dd4d969967ea5
-
SSDEEP
3072:fyN4eb8nd+YaHKk0K/nPE173NJkTB+nuvgKMSfFIb:KN4eb8nd+YgNv817NJIB+uvTM5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2060 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 316 wrote to memory of 2060 316 279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe 30 PID 316 wrote to memory of 2060 316 279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe 30 PID 316 wrote to memory of 2060 316 279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe 30 PID 316 wrote to memory of 2060 316 279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\279557500722a4c6b44a6310628cb75d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Pkf..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5403e4672259fc5147508a678bdc0400b
SHA11a5d570e2980e0c6c715aed1867a2486c26ca4f2
SHA2568442d14c1cb05ff1686480f31343cc07bfc92f15d6c2e4b54864355f1ef60087
SHA512f28a3b119de6bf5afbd540d3cccc58adbe21d5e38477bc552d668510d7fbc114894524684fe71967e5ebd2bf5cec7bc454d8059491c72c2988d6f2040502a2a0