Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
311fb33cba4b2d1d8f5af12610aaa88b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
311fb33cba4b2d1d8f5af12610aaa88b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
311fb33cba4b2d1d8f5af12610aaa88b_JaffaCakes118.exe
-
Size
90KB
-
MD5
311fb33cba4b2d1d8f5af12610aaa88b
-
SHA1
bd5d707d4a8ab3fd7e02e1346053477987ae9683
-
SHA256
d33959ed0369b5fe138ad10bdb8cf450a39d35060d6ecc4e0f206b4aafc7ec01
-
SHA512
5bd8bd193f60a3d8ef7c5115a0d8560e150e720353b5a498e6ccb23460f1041310b6cf2d22da850836badd8d282fc0cddc542581c04b70cc924dd8213493e4d1
-
SSDEEP
1536:ERzjZmEnutefUwUuoZzUl+JVuJV3p917/:SZmgFUjjhUlMVuJV3p
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2852 cmd.exe -
resource yara_rule behavioral1/memory/2324-14-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2324-18-0x0000000000400000-0x0000000000474000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 311fb33cba4b2d1d8f5af12610aaa88b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2852 2324 311fb33cba4b2d1d8f5af12610aaa88b_JaffaCakes118.exe 32 PID 2324 wrote to memory of 2852 2324 311fb33cba4b2d1d8f5af12610aaa88b_JaffaCakes118.exe 32 PID 2324 wrote to memory of 2852 2324 311fb33cba4b2d1d8f5af12610aaa88b_JaffaCakes118.exe 32 PID 2324 wrote to memory of 2852 2324 311fb33cba4b2d1d8f5af12610aaa88b_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\311fb33cba4b2d1d8f5af12610aaa88b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\311fb33cba4b2d1d8f5af12610aaa88b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5813322b717ba54910198699a06b00803
SHA11568dec324af401ddc78f7593e59eb5b7ad3c941
SHA25647844071c847d4e9b4c9cd27d4762a925be425477c547321bf00836cce74d03f
SHA512be8be07ee4b63e36ec0797bb07fa508f6bfc0ed41775d9f220aaa1e0d1e591e3a2871676a88aaf88519177c0d6e3815419d1098a296f13a8e4dacee9f0e04def