Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 19:02
Behavioral task
behavioral1
Sample
418caa4245158db08e20d7853294e147_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
418caa4245158db08e20d7853294e147_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
418caa4245158db08e20d7853294e147
-
SHA1
08c4695393f39660ddf5e22c394bfd4677abecf6
-
SHA256
0cda15a2f66fc0c9a1190b5e746c359da6cf4295b692f571a64d1076feefbc31
-
SHA512
993f325ef85b67c994409c2ef29e77669a3fda8dedb10bc6cf40a420277971baace38d9ac33d9a0debbcaf5f41e29403f1e804ee13fe04409056b001bc541784
-
SSDEEP
24576:rpXYpJUO6Kd+TwSmuGShf6Fn9Bn1/rTMby5bnuExaLAm6MCmFS4VWO:2paKd+TXmufub1/UbiQA3MzBVf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4176 418caa4245158db08e20d7853294e147_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/5060-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000a000000023c4f-11.dat upx behavioral2/memory/4176-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 418caa4245158db08e20d7853294e147_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 418caa4245158db08e20d7853294e147_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5060 418caa4245158db08e20d7853294e147_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5060 418caa4245158db08e20d7853294e147_JaffaCakes118.exe 4176 418caa4245158db08e20d7853294e147_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4176 5060 418caa4245158db08e20d7853294e147_JaffaCakes118.exe 84 PID 5060 wrote to memory of 4176 5060 418caa4245158db08e20d7853294e147_JaffaCakes118.exe 84 PID 5060 wrote to memory of 4176 5060 418caa4245158db08e20d7853294e147_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\418caa4245158db08e20d7853294e147_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\418caa4245158db08e20d7853294e147_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\418caa4245158db08e20d7853294e147_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\418caa4245158db08e20d7853294e147_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:4176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD551990b6bd9b341cbecf846721beb1ce4
SHA114c372ccf355473687f9bc9d6de797e903495ef0
SHA256f8294ef1c0db10c92a141390789794cee921518eba41ddb8cc98465c85c92936
SHA51242dd123aad98fc8dda491852b7a51f61e43233f0c0a0414479d3de939850b8a2aaed422f4664ddb4a4dd990da827e9a256665a237efab628986195c77fdf3bf9