Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 02:02
Behavioral task
behavioral1
Sample
54df1d392d7e29552b828681340880af_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
54df1d392d7e29552b828681340880af_JaffaCakes118.exe
-
Size
133KB
-
MD5
54df1d392d7e29552b828681340880af
-
SHA1
67cbbb86efa984f6b2836059c635538f1e6acc17
-
SHA256
a69cc68dc9783a83748fd2690155d35fb2c9f3706f8fceb2ca57464911b04c61
-
SHA512
3d878069273d6c2ff24bf62ec9d1cae817c9c858acfced5d7062acd11b5acf27d3d475006fe61bd0242f1b5ae85cdcfbdb0ec581a1a5ee77358555fac7c68668
-
SSDEEP
3072:CEyTUX4V1CRosbgT0VUXUiaDHBCirm1dXi7tzj3ZsstQ:e3QysUGUY5mXSFFLQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1372 54df1d392d7e29552b828681340880af_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1372 54df1d392d7e29552b828681340880af_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3428-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/files/0x000b000000023b85-12.dat upx behavioral2/memory/1372-14-0x0000000000400000-0x0000000000486000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54df1d392d7e29552b828681340880af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54df1d392d7e29552b828681340880af_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3428 54df1d392d7e29552b828681340880af_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3428 54df1d392d7e29552b828681340880af_JaffaCakes118.exe 1372 54df1d392d7e29552b828681340880af_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3428 wrote to memory of 1372 3428 54df1d392d7e29552b828681340880af_JaffaCakes118.exe 85 PID 3428 wrote to memory of 1372 3428 54df1d392d7e29552b828681340880af_JaffaCakes118.exe 85 PID 3428 wrote to memory of 1372 3428 54df1d392d7e29552b828681340880af_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\54df1d392d7e29552b828681340880af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54df1d392d7e29552b828681340880af_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\54df1d392d7e29552b828681340880af_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54df1d392d7e29552b828681340880af_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD578608768573bed071c000266bd1cb2bd
SHA1e4787de6cf2328ff39e8e2ece5357fe0b0d3c45c
SHA25634655ca6609afc832b3a6d5a85c019edf6a7bc13f34d25d76ac3037aaf576988
SHA512d0eb2ea60299bcd72cd80290d59452fd3001efdbe2ecf919e7592b7678540655ad99eb33611d43978e3663b40dccde59c2d0c31c975d7e000ee5447f94bb2152