Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe
-
Size
244KB
-
MD5
3a2a41ad081385c0c63f17e34222ac4f
-
SHA1
046e26d917440fb9ba4d56340a25588e1e32bd94
-
SHA256
630bda8f49bee42f0ada36602708d2324d89d74436ffd5d42e072c2dd59da54e
-
SHA512
efa7cd1f99797903f4b18c22e12cb673453209a2f76e73490f7440054af2fa7507b9903a70e4de3173731d0f9c77865ecc4d81b682973f3e0e3d967701136add
-
SSDEEP
3072:Ucd0ZCG3lP3U8BAp5Tz+BXeULCGZQAdlk2EbbtAHEuHL991ix1GStwDi:UcfG3lftB8z+BOULEAdlk2Eq599/Di
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\jHCP7v9Cv1GGwfEhDdMn3Nzgd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe" 3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1256 3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2548 1256 3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe 31 PID 1256 wrote to memory of 2548 1256 3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe 31 PID 1256 wrote to memory of 2548 1256 3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe 31 PID 1256 wrote to memory of 2548 1256 3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a2a41ad081385c0c63f17e34222ac4f_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\gpdelrec.bat2⤵
- System Location Discovery: System Language Discovery
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD59797995808e250431f47ca0fca3162c2
SHA159cabc9ad963caf32b044ff8c0840f2a99e79b15
SHA256cb7545e6f1b2d63638714d7d7cff6b062bc6dfee96f429fb53bb89b739fc5cb8
SHA512a30f022118874041aea531299c97796f5f595cd5c3f7212d303fc57b357ce386f14db38380df2d1313a0db19c17f21a3fd83ba0f0faa2357505668ecfa8475c4