Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe
-
Size
108KB
-
MD5
2cc0c424bb51d971acb901c7f2a2c390
-
SHA1
6de563f32df21195d74c9d293d328017dd184938
-
SHA256
bd3d0c49fcefca2a0be49b74a9eb3a48c0aa41db3ff2a3c60955db51f891855b
-
SHA512
52330c0cb1842a6a6f865cfaeaa2b48ca835696646af31fae13cab527f7e3ccce790c36e4249d40f4210f26681a4ac59211073ac11d8caaddaa79c3d1f0f85aa
-
SSDEEP
3072:rQNk06cONc/YxGQTtkBMq08tZdOqAmcfg:jc/zQRkT/Omc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4892 KB00275862.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1184 4892 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KB00275862.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4892 KB00275862.exe 4892 KB00275862.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 4892 KB00275862.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4416 wrote to memory of 2584 4416 2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe 86 PID 4416 wrote to memory of 2584 4416 2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe 86 PID 4416 wrote to memory of 2584 4416 2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4892 4416 2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe 87 PID 4416 wrote to memory of 4892 4416 2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe 87 PID 4416 wrote to memory of 4892 4416 2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2cc0c424bb51d971acb901c7f2a2c390_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\expBE10.tmp.bat"2⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Users\Admin\AppData\Roaming\KB00275862.exe"C:\Users\Admin\AppData\Roaming\KB00275862.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 6923⤵
- Program crash
PID:1184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4892 -ip 48921⤵PID:3988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286B
MD567bd76e76cdafef84f8b37ecdc323be5
SHA11a22d2ae01429aa5499dfbf426ba0c79e7dfe6bb
SHA256ec2a334d08cd704f4de16c271738f00aaface157287c1db3f391f6a77b62aefc
SHA5120a90e5b7a45ac87b82122e3f54b09ea3021762a79a3266cff97acd758269e0c1e43c28951991e34a8e564a220d632bc0a00273035af78d510d50b6717355beaf
-
Filesize
108KB
MD52cc0c424bb51d971acb901c7f2a2c390
SHA16de563f32df21195d74c9d293d328017dd184938
SHA256bd3d0c49fcefca2a0be49b74a9eb3a48c0aa41db3ff2a3c60955db51f891855b
SHA51252330c0cb1842a6a6f865cfaeaa2b48ca835696646af31fae13cab527f7e3ccce790c36e4249d40f4210f26681a4ac59211073ac11d8caaddaa79c3d1f0f85aa