Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe
-
Size
506KB
-
MD5
b4efa6d2869629fdc54ff35ade6ca321
-
SHA1
5ee1ab8e98c16fef6bfa1f8f6f808c8f5aa4026e
-
SHA256
65901cd2d607fb034674bb84e9d9d2e911ce2e8e0676dc08b2f3649129d93c33
-
SHA512
ea1856e02dfbbda0ed5e3bdfde31cd8b92cc135adfac2601a233c629d06161fd9be2aacd29278962ad369158ddb4026be145fd94f14d70c859852305b5f83693
-
SSDEEP
12288:mutrzh9xOXkYZcZxkXAPCfjFahGf+buZkDgLxJiXUbARkNmGozI:mutr5OUYZaaOkFahGfOf8NJNA2MGo8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2388 gbMod.exe -
Loads dropped DLL 2 IoCs
pid Process 1720 b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe 1720 b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gbMod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2388 1720 b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2388 1720 b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2388 1720 b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2388 1720 b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2388 1720 b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2388 1720 b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2388 1720 b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4efa6d2869629fdc54ff35ade6ca321_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\gbMod.exe"C:\Users\Admin\AppData\Local\Temp\gbMod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.3MB
MD5ce6ba7d54229afa72fa113a9ff68fb33
SHA1943cd823e56fc5a57463c93a2c7bd21cb02e3868
SHA25634f73011fb3fc2085de1bd5651a1dce550b9715e2904f9afecabc3a739444da5
SHA512236164101ad7dc006c1e2fa7972b1e1f28aeabce2b3d932032ceec95005e0cb00d15a24632dc1ea6befb33ffa66ef6746d0c5c157daafde3078d27a565e22696