Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2024, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
c6d683127959d5369b592204181158f2_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
c6d683127959d5369b592204181158f2_JaffaCakes118.exe
-
Size
390KB
-
MD5
c6d683127959d5369b592204181158f2
-
SHA1
d6d66737595a16ce89cc38255b685690f861e47e
-
SHA256
7257f8777890ef7a5b37e032bf3616bb97e76d68a59adf4f92920a7de97717eb
-
SHA512
829704451e8bee3da14954c5da23d20b7fc212f792025b44396489ec5b9818cfa7d271474323fa16db715ca58f81bdb5ce5b516f0663b3f914059573838b5011
-
SSDEEP
6144:E/DFh/5GRNdtNhFdj6UCEdpFdNv/ne8ZK+yS1:SFxgRHd76rgpFdNvvxZ
Malware Config
Signatures
-
Emotet family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6d683127959d5369b592204181158f2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shooterstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shooterstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shooterstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6d683127959d5369b592204181158f2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4948 c6d683127959d5369b592204181158f2_JaffaCakes118.exe 4948 c6d683127959d5369b592204181158f2_JaffaCakes118.exe 4244 c6d683127959d5369b592204181158f2_JaffaCakes118.exe 4244 c6d683127959d5369b592204181158f2_JaffaCakes118.exe 4744 shooterstr.exe 4744 shooterstr.exe 772 shooterstr.exe 772 shooterstr.exe 1680 shooterstr.exe 1680 shooterstr.exe 1680 shooterstr.exe 1680 shooterstr.exe 1680 shooterstr.exe 1680 shooterstr.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4244 c6d683127959d5369b592204181158f2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4244 4948 c6d683127959d5369b592204181158f2_JaffaCakes118.exe 96 PID 4948 wrote to memory of 4244 4948 c6d683127959d5369b592204181158f2_JaffaCakes118.exe 96 PID 4948 wrote to memory of 4244 4948 c6d683127959d5369b592204181158f2_JaffaCakes118.exe 96 PID 4744 wrote to memory of 772 4744 shooterstr.exe 101 PID 4744 wrote to memory of 772 4744 shooterstr.exe 101 PID 4744 wrote to memory of 772 4744 shooterstr.exe 101 PID 772 wrote to memory of 1680 772 shooterstr.exe 102 PID 772 wrote to memory of 1680 772 shooterstr.exe 102 PID 772 wrote to memory of 1680 772 shooterstr.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d683127959d5369b592204181158f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c6d683127959d5369b592204181158f2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\c6d683127959d5369b592204181158f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c6d683127959d5369b592204181158f2_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4244
-
-
C:\Windows\SysWOW64\shooterstr.exe"C:\Windows\SysWOW64\shooterstr.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\shooterstr.exe"C:\Windows\SysWOW64\shooterstr.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\shooterstr.exe"C:\Windows\SysWOW64\shooterstr.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-