Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 05:36
Static task
static1
Behavioral task
behavioral1
Sample
55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
55bd1beb4e9f5600f240880940657992
-
SHA1
72974a5d29194f13cf59378f368c8e9618f24b74
-
SHA256
2ca0ff4b6a6859388c04033ebc61501ccaea8108d527b39883ce604f0fa54e87
-
SHA512
77e69b3267afc3eeee66b024593fc8a0407c9a29c39aa078aab18f85b393217ceede3f5e5f824593b6bc09d513251ff80f882a50b794833f7ebed36076a4d414
-
SSDEEP
49152:Qoa1taC070dKaCW0bQaNA5gn/WSRkLiKXYP+RU2xqW4l:Qoa1taC0Bvq5g/ZKXa+Rjf4l
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 498E.tmp -
Executes dropped EXE 1 IoCs
pid Process 2816 498E.tmp -
Loads dropped DLL 1 IoCs
pid Process 2756 55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 498E.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2816 2756 55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe 30 PID 2756 wrote to memory of 2816 2756 55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe 30 PID 2756 wrote to memory of 2816 2756 55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe 30 PID 2756 wrote to memory of 2816 2756 55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\498E.tmp"C:\Users\Admin\AppData\Local\Temp\498E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\55bd1beb4e9f5600f240880940657992_JaffaCakes118.exe DA31AF61AADFD7DAE974582FD13F9457E222650D18E4EF94A6B83F476494E815FC6B2BBCF3F8B549CBD4080560190303B7BE86BAD704EC7D55AD591251DE44952⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5df303a80be502081e899b2a09e188ef9
SHA187d299234d40dba3681244069f528c7fb30887ea
SHA256d4492a89d5dcb9bf5aa17fea5f816f5a60eadc1d33a60a60760e0d74c58df2c0
SHA512600490f7a8f79bb2370485d174091feabe9566fb5a4818db30dce85db27b20f469882a6cb3ef86a99af2d4d313df5650330f04824fe666a3ec89c548a92dd26d