Analysis
-
max time kernel
147s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe
-
Size
142KB
-
MD5
2acad191ecf88d53d76d3d68425b0256
-
SHA1
a69a0282ea3e9ffa668545bdfb4541985c19946a
-
SHA256
ee981d6e307421f3fcc6ce3d561887cb0b726cc4e666a2aa5142f3344f1e95e7
-
SHA512
2efca378fc258432df5c7fad1dd561b3640367fa9f9ec3d9b210611f2facb7d4693b665b9e6309abcd8c17c01fd48928cda04268be4f3a9a435671b460dcfe84
-
SSDEEP
3072:esvicRSw3P89L9qnikDQhOjaIoWgI1pCWU6rYaehI:Dvsk8XjBIjaIoWg6U6ca4I
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2508 sex.exe 1808 sex.exe 1316 sex.exe 740 sex.exe 1984 sex.exe 4112 sex.exe 5096 sex.exe 4332 sex.exe 4988 sex.exe 4436 sex.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File created C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe File opened for modification C:\Windows\SysWOW64\sex.exe sex.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2508 2556 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe 84 PID 2556 wrote to memory of 2508 2556 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe 84 PID 2556 wrote to memory of 2508 2556 2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe 84 PID 2508 wrote to memory of 1808 2508 sex.exe 87 PID 2508 wrote to memory of 1808 2508 sex.exe 87 PID 2508 wrote to memory of 1808 2508 sex.exe 87 PID 1808 wrote to memory of 1316 1808 sex.exe 90 PID 1808 wrote to memory of 1316 1808 sex.exe 90 PID 1808 wrote to memory of 1316 1808 sex.exe 90 PID 1316 wrote to memory of 740 1316 sex.exe 92 PID 1316 wrote to memory of 740 1316 sex.exe 92 PID 1316 wrote to memory of 740 1316 sex.exe 92 PID 740 wrote to memory of 1984 740 sex.exe 93 PID 740 wrote to memory of 1984 740 sex.exe 93 PID 740 wrote to memory of 1984 740 sex.exe 93 PID 1984 wrote to memory of 4112 1984 sex.exe 94 PID 1984 wrote to memory of 4112 1984 sex.exe 94 PID 1984 wrote to memory of 4112 1984 sex.exe 94 PID 4112 wrote to memory of 5096 4112 sex.exe 95 PID 4112 wrote to memory of 5096 4112 sex.exe 95 PID 4112 wrote to memory of 5096 4112 sex.exe 95 PID 5096 wrote to memory of 4332 5096 sex.exe 96 PID 5096 wrote to memory of 4332 5096 sex.exe 96 PID 5096 wrote to memory of 4332 5096 sex.exe 96 PID 4332 wrote to memory of 4988 4332 sex.exe 97 PID 4332 wrote to memory of 4988 4332 sex.exe 97 PID 4332 wrote to memory of 4988 4332 sex.exe 97 PID 4988 wrote to memory of 4436 4988 sex.exe 98 PID 4988 wrote to memory of 4436 4988 sex.exe 98 PID 4988 wrote to memory of 4436 4988 sex.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 1032 "C:\Users\Admin\AppData\Local\Temp\2acad191ecf88d53d76d3d68425b0256_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 1156 "C:\Windows\SysWOW64\sex.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 1128 "C:\Windows\SysWOW64\sex.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 1132 "C:\Windows\SysWOW64\sex.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 1124 "C:\Windows\SysWOW64\sex.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 1136 "C:\Windows\SysWOW64\sex.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 1140 "C:\Windows\SysWOW64\sex.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 1144 "C:\Windows\SysWOW64\sex.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 1092 "C:\Windows\SysWOW64\sex.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\sex.exeC:\Windows\system32\sex.exe 1152 "C:\Windows\SysWOW64\sex.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4436
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD52acad191ecf88d53d76d3d68425b0256
SHA1a69a0282ea3e9ffa668545bdfb4541985c19946a
SHA256ee981d6e307421f3fcc6ce3d561887cb0b726cc4e666a2aa5142f3344f1e95e7
SHA5122efca378fc258432df5c7fad1dd561b3640367fa9f9ec3d9b210611f2facb7d4693b665b9e6309abcd8c17c01fd48928cda04268be4f3a9a435671b460dcfe84