Analysis
-
max time kernel
96s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
2a61649b5ab03113adf25e9851c87b07_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2a61649b5ab03113adf25e9851c87b07_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/xj1p5nglbsy8uwrow.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/xj1p5nglbsy8uwrow.exe
Resource
win10v2004-20241007-en
General
-
Target
2a61649b5ab03113adf25e9851c87b07_JaffaCakes118.exe
-
Size
168KB
-
MD5
2a61649b5ab03113adf25e9851c87b07
-
SHA1
4b04fb36e47ac44585a67efc42e14ce243339893
-
SHA256
2fb2f26b9e5319bf2b070e9e27dcdab0eb0505443b18846accbfb4751be1f550
-
SHA512
8ddc402ac47fece5adf66a674b97c572774cd35ba9cc75d250c4283fbbc7bca552908c00b8e240c623f362d40be08c236a93a01d4a51ded4cec15ad63ea3edf2
-
SSDEEP
3072:q22ihA0m3BJf0A6GHepWYx4mcyQFQYDbuYizsNJ6CvHD:FA0m3T0A6GHkjPQWYuYizAX/D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 764 xj1p5nglbsy8uwrow.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a61649b5ab03113adf25e9851c87b07_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xj1p5nglbsy8uwrow.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 764 xj1p5nglbsy8uwrow.exe 764 xj1p5nglbsy8uwrow.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1940 wrote to memory of 764 1940 2a61649b5ab03113adf25e9851c87b07_JaffaCakes118.exe 84 PID 1940 wrote to memory of 764 1940 2a61649b5ab03113adf25e9851c87b07_JaffaCakes118.exe 84 PID 1940 wrote to memory of 764 1940 2a61649b5ab03113adf25e9851c87b07_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a61649b5ab03113adf25e9851c87b07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a61649b5ab03113adf25e9851c87b07_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\xj1p5nglbsy8uwrow.exe"C:\Users\Admin\AppData\Local\Temp\xj1p5nglbsy8uwrow.exe" /initurl http://bi.bisrv.com/init/2a61649b5ab03113adf25e9851c87b07_JaffaCakes118/:uid:? /affid "-" /id "0" /name " " /uniqid 2a61649b5ab03113adf25e9851c87b07_JaffaCakes1182⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD592c732231b7909edeff180174c6ef499
SHA19a3475327fc02a2434383c1ff3b41c90fa27e2fe
SHA256d4045cd1fc7ca786ca585ca163d2e0ec0065ee4c42a09f034d8001a382704a43
SHA512bca065f0faa69069d2a9ce6abaa705aba320f5f8d8c6ea91447590c561face3a37817fb727c4f34cc45dd9f7fa7932dcc8bd4bea7952ef3e06f2158dcb5eed1d