Analysis
-
max time kernel
93s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/biclient.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$TEMP/biclient.exe
Resource
win10v2004-20241007-en
General
-
Target
2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe
-
Size
159KB
-
MD5
2c2aaba01dd4eee1b0e89043858e67ed
-
SHA1
b20d5d5f363b33bbd979bcd16fdf9e00dc9977b6
-
SHA256
ddd2a720c2589c503776c0248a79eda2738fef749aa4759ee55b12a36bdc577c
-
SHA512
426f7690771618de6280c23ba8dc48e4e7c901cf78c79e5c140b5e34fb88894f9c9aaf3fba10bb840e4a4e1a15bd254ef7eacff55a1a7409a3951770774e557b
-
SSDEEP
3072:X22ihA0m3BJf0AIGSYoQAL8zNZE/CyHhdjNRczbMTMzbZ9CA:oA0m3T0AITYoQrhZEqyzZGHMGb5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4992 biclient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biclient.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4992 biclient.exe 4992 biclient.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1020 wrote to memory of 4992 1020 2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe 84 PID 1020 wrote to memory of 4992 1020 2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe 84 PID 1020 wrote to memory of 4992 1020 2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\biclient.exe"C:\Users\Admin\AppData\Local\Temp\biclient.exe" /initurl http://bi.bisrv.com/:affid:/:sid:/:uid:? /affid "ffonts" /id "adventxomx" /name "ADVENT" /uniqid 2c2aaba01dd4eee1b0e89043858e67ed_JaffaCakes1182⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD5c66293ccd7cbe84b1b8f393ca5e4e6d7
SHA1c24089d407e6280b79bec86532e9de0118e4de71
SHA256ffbae29e2f233767fd42909720497165ce3552427ef93efb2fc714fb4204755f
SHA5127ff97aa71f182035f90ba10c3bf8087280e3f34bf717bda139d642f4e043c64aa2b98d82a90a32f1df4b76f9d7610af62390fe934e514c90c703381a421c00b7
-
Filesize
79B
MD53448a36fc857f6b3dc1ff89ef61eb6c9
SHA10effdb4e517257be9f07319f62191b7ccfcc9be7
SHA25682e3e35966a1b929e4956e40be92ad17db7c58f5d548f4d007ca17ab9f11a3c7
SHA512e6cc624ffc3dd9a1c73fd80a78932be5af5e33eb5cc7895aea68c0634fa72996b057b39fb3291febbf7ac6ca68376504db62ed35a88b6c56c0308ce45b67a05e