Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe
-
Size
281KB
-
MD5
4490c02f7c00f0bd3b1651dc14ffe0c2
-
SHA1
a6821c3d1155b4cc03fdd951feb68be9245dbcf2
-
SHA256
e61c5d7070dc5d2eda2961f68f7681ff7ceedbff0ae791a3347d8c811731d864
-
SHA512
2a3655a22c2f8ac190b5aa636410c359f8f9df5779f8c6ac8782d5d109da8fc353c680faaaf6e30a12cb068c9c90c2f934b8f44a63ea07e041dd01427f14f9c6
-
SSDEEP
6144:gUyMHM8MX71fo8G0cZUyK98gWNlPTGQQm6agrdI9qMe:gl8ML1fo8GpNtTirdIwMe
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 1728 Blue.exe 1824 Blue.exe 1088 Blue.exe 4248 Blue.exe 4316 Blue.exe 3708 Blue.exe 3744 Blue.exe 3360 Blue.exe 1124 Blue.exe 4052 Blue.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\Blue.exe 4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\Blue.exe Blue.exe File opened for modification C:\Windows\SysWOW64\Blue.exe Blue.exe File created C:\Windows\SysWOW64\Blue.exe Blue.exe File opened for modification C:\Windows\SysWOW64\Blue.exe Blue.exe File created C:\Windows\SysWOW64\Blue.exe Blue.exe File created C:\Windows\SysWOW64\Blue.exe Blue.exe File created C:\Windows\SysWOW64\Blue.exe Blue.exe File opened for modification C:\Windows\SysWOW64\Blue.exe Blue.exe File created C:\Windows\SysWOW64\Blue.exe Blue.exe File opened for modification C:\Windows\SysWOW64\Blue.exe Blue.exe File opened for modification C:\Windows\SysWOW64\Blue.exe 4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Blue.exe Blue.exe File opened for modification C:\Windows\SysWOW64\Blue.exe Blue.exe File created C:\Windows\SysWOW64\Blue.exe Blue.exe File opened for modification C:\Windows\SysWOW64\Blue.exe Blue.exe File opened for modification C:\Windows\SysWOW64\Blue.exe Blue.exe File created C:\Windows\SysWOW64\Blue.exe Blue.exe File created C:\Windows\SysWOW64\Blue.exe Blue.exe File opened for modification C:\Windows\SysWOW64\Blue.exe Blue.exe File opened for modification C:\Windows\SysWOW64\Blue.exe Blue.exe File created C:\Windows\SysWOW64\Blue.exe Blue.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blue.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3892 wrote to memory of 1728 3892 4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe 84 PID 3892 wrote to memory of 1728 3892 4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe 84 PID 3892 wrote to memory of 1728 3892 4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe 84 PID 1728 wrote to memory of 1824 1728 Blue.exe 95 PID 1728 wrote to memory of 1824 1728 Blue.exe 95 PID 1728 wrote to memory of 1824 1728 Blue.exe 95 PID 1824 wrote to memory of 1088 1824 Blue.exe 97 PID 1824 wrote to memory of 1088 1824 Blue.exe 97 PID 1824 wrote to memory of 1088 1824 Blue.exe 97 PID 1088 wrote to memory of 4248 1088 Blue.exe 100 PID 1088 wrote to memory of 4248 1088 Blue.exe 100 PID 1088 wrote to memory of 4248 1088 Blue.exe 100 PID 4248 wrote to memory of 4316 4248 Blue.exe 101 PID 4248 wrote to memory of 4316 4248 Blue.exe 101 PID 4248 wrote to memory of 4316 4248 Blue.exe 101 PID 4316 wrote to memory of 3708 4316 Blue.exe 104 PID 4316 wrote to memory of 3708 4316 Blue.exe 104 PID 4316 wrote to memory of 3708 4316 Blue.exe 104 PID 3708 wrote to memory of 3744 3708 Blue.exe 105 PID 3708 wrote to memory of 3744 3708 Blue.exe 105 PID 3708 wrote to memory of 3744 3708 Blue.exe 105 PID 3744 wrote to memory of 3360 3744 Blue.exe 114 PID 3744 wrote to memory of 3360 3744 Blue.exe 114 PID 3744 wrote to memory of 3360 3744 Blue.exe 114 PID 3360 wrote to memory of 1124 3360 Blue.exe 115 PID 3360 wrote to memory of 1124 3360 Blue.exe 115 PID 3360 wrote to memory of 1124 3360 Blue.exe 115 PID 1124 wrote to memory of 4052 1124 Blue.exe 116 PID 1124 wrote to memory of 4052 1124 Blue.exe 116 PID 1124 wrote to memory of 4052 1124 Blue.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\Blue.exeC:\Windows\system32\Blue.exe 1224 "C:\Users\Admin\AppData\Local\Temp\4490c02f7c00f0bd3b1651dc14ffe0c2_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\Blue.exeC:\Windows\system32\Blue.exe 1184 "C:\Windows\SysWOW64\Blue.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Blue.exeC:\Windows\system32\Blue.exe 1156 "C:\Windows\SysWOW64\Blue.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\Blue.exeC:\Windows\system32\Blue.exe 1168 "C:\Windows\SysWOW64\Blue.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\Blue.exeC:\Windows\system32\Blue.exe 1160 "C:\Windows\SysWOW64\Blue.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\Blue.exeC:\Windows\system32\Blue.exe 1164 "C:\Windows\SysWOW64\Blue.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\Blue.exeC:\Windows\system32\Blue.exe 1176 "C:\Windows\SysWOW64\Blue.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\Blue.exeC:\Windows\system32\Blue.exe 1172 "C:\Windows\SysWOW64\Blue.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\Blue.exeC:\Windows\system32\Blue.exe 1124 "C:\Windows\SysWOW64\Blue.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\Blue.exeC:\Windows\system32\Blue.exe 1192 "C:\Windows\SysWOW64\Blue.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4052
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD54490c02f7c00f0bd3b1651dc14ffe0c2
SHA1a6821c3d1155b4cc03fdd951feb68be9245dbcf2
SHA256e61c5d7070dc5d2eda2961f68f7681ff7ceedbff0ae791a3347d8c811731d864
SHA5122a3655a22c2f8ac190b5aa636410c359f8f9df5779f8c6ac8782d5d109da8fc353c680faaaf6e30a12cb068c9c90c2f934b8f44a63ea07e041dd01427f14f9c6