Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe
-
Size
29KB
-
MD5
2930b725c5003b01705ba06555aecbb7
-
SHA1
f19e80343d4776086cd6c3a7398ae968a1ff6199
-
SHA256
d9cd7f2c7876bc702808804c70a964ea571171133a737c657106c647a8dcf456
-
SHA512
a48f9ae3c2f08273643fffec6bedf8dd4b7d4b206f4e2b2ef0a308603baa978b81e15185953d2bdb515e87a5100a3beb47c8ea51a5c4a6f1ca41a6557b737857
-
SSDEEP
384:BJBcQ3oQ/jeO6Rj2cKfbKyVtGqJ06Mq0NM:1cqoGjeO6Rjnyjohq0NM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 herewin.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language herewin.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2976 2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe 3040 herewin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3040 2976 2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe 30 PID 2976 wrote to memory of 3040 2976 2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe 30 PID 2976 wrote to memory of 3040 2976 2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe 30 PID 2976 wrote to memory of 3040 2976 2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2930b725c5003b01705ba06555aecbb7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\herewin.exe"C:\Users\Admin\AppData\Local\Temp\herewin.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5d53a6fc4407a9a856be6770c7c6b0c88
SHA195071d5c95f0426a96892e3d61767db59e4246a7
SHA2568190aeeb929d14493da9ba54e3ffff90e95ef91c4ded7717d02036ae490c9131
SHA512f1336361fcc7dbb32c0e529276f4b205786f6801821c27f740bcb83a8f90be807ce3711bee16b4a105d8b701ee12be10cd27642f930d734412efefe1baf994b9