Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
42f0648ee6e097904f342dd93bc112a1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42f0648ee6e097904f342dd93bc112a1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
42f0648ee6e097904f342dd93bc112a1_JaffaCakes118.exe
-
Size
143KB
-
MD5
42f0648ee6e097904f342dd93bc112a1
-
SHA1
72f6df4202b21a028213a85ce13b58dd5678a418
-
SHA256
e4035c7b67c9800ee1c76e2b33e53ce3b2d1f2d1dd9a7a9a97f11ba1c10f02f9
-
SHA512
b06a0e7dd0242192d3f798ec87f97b477013d87f07e2a5a545a4217ccd14e132909a84fceaa466c6eb1a56457f8b0f851424ee41b7066fa2a419c02c7467c108
-
SSDEEP
3072:u3+zoLcd8WwJmxgWw/l3s43P98RHlP/spL+fRYLmgGTULpyXevlmSbReH:u4oA8kqP/l3s4/98fPEpVmBT2uwlm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2040 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42f0648ee6e097904f342dd93bc112a1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2040 2016 42f0648ee6e097904f342dd93bc112a1_JaffaCakes118.exe 31 PID 2016 wrote to memory of 2040 2016 42f0648ee6e097904f342dd93bc112a1_JaffaCakes118.exe 31 PID 2016 wrote to memory of 2040 2016 42f0648ee6e097904f342dd93bc112a1_JaffaCakes118.exe 31 PID 2016 wrote to memory of 2040 2016 42f0648ee6e097904f342dd93bc112a1_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\42f0648ee6e097904f342dd93bc112a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\42f0648ee6e097904f342dd93bc112a1_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Qvp..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5663c128b43a186088b0856a806f7e6df
SHA1d73546a1a04e3a35372c16113cf723f87bec4d0d
SHA25669a530c9c320f8717040a5c9a2d831a0f0a118b9f4b48cbfc358b452ce493afb
SHA512dcea55639801cbdd125ac494f2d0c62639bda21e70707b6fb652ea494d76b09ad6bb369be4f927fe9df880c2ff1670add766fa034566afabd1c7989afe31e244