Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
4071217ad2a3a4436fe52d4c69e79962_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4071217ad2a3a4436fe52d4c69e79962_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4071217ad2a3a4436fe52d4c69e79962_JaffaCakes118.exe
-
Size
9KB
-
MD5
4071217ad2a3a4436fe52d4c69e79962
-
SHA1
92b6762cdb136c61cab03af91bde75eeecefe943
-
SHA256
ef6ecfa1f5e6e22e207e9e2d276109fcaa514a736cd877c8b3d3e4b48925113d
-
SHA512
a2a079d6f499c905b697762db8a8c3899755eb65c38cb68d2585f28453341c4fd90efb21adc641b50cad5442d477906972563486407126935963e63d5f3cb6d9
-
SSDEEP
192:wOOb2RyoXYRy/bZdRSvxYb1uwPN7Z9KbBJRh:wO0abT4vxYRuwPNbKVh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1364 E.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4071217ad2a3a4436fe52d4c69e79962_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1364 2644 4071217ad2a3a4436fe52d4c69e79962_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1364 2644 4071217ad2a3a4436fe52d4c69e79962_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1364 2644 4071217ad2a3a4436fe52d4c69e79962_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1364 2644 4071217ad2a3a4436fe52d4c69e79962_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4071217ad2a3a4436fe52d4c69e79962_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4071217ad2a3a4436fe52d4c69e79962_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\E.exe"\E.exe"2⤵
- Executes dropped EXE
PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50593b712dace9186aa84cb41986360df
SHA192b6f802eac6bb081972f0676d5f7ccf63d5d87a
SHA256d47f54e0ffbb4fde796538b0f1addb06d981d7c1be0236ebd6e402238ca1b805
SHA5121bd6550435603abad3859b9247d0c1c81fb08f0586cdd8d374835fc923deee6aa6a34d5a805c8de0b4fe38c67372ef71515a23818d5832019a9214531a9238bd