Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/12/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe
-
Size
132KB
-
MD5
d53561bc250a8df21c55d281333c53c2
-
SHA1
b2dcbed70e532d3f5ccadb7d6b12ca0a3a503b93
-
SHA256
105621308da39fce8b0d745cdccd592867d5084b4a7c2b9e31bbbfd912bb12f6
-
SHA512
0cad4886729121ea6f8112ad63b9c49529afcebf06f1702e6478d22722857db6f171eb9e2919b36cf0962067e1d4921cb9aa71c0960247d63c6736f173f1f2ec
-
SSDEEP
3072:LHDv/Dl8pso19eRgoenWp54iF5WpS8hdiNYXpFOeGFs:LHfl8WoTzoeWf4Y5sS8ziNy
Malware Config
Signatures
-
Emotet family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hexaelement.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hexaelement.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1364 d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe 1364 d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe 4276 d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe 4276 d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe 3256 hexaelement.exe 3256 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe 2112 hexaelement.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 1364 d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe 4276 d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe 3256 hexaelement.exe 2112 hexaelement.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4276 d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1364 wrote to memory of 4276 1364 d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe 83 PID 1364 wrote to memory of 4276 1364 d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe 83 PID 1364 wrote to memory of 4276 1364 d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe 83 PID 3256 wrote to memory of 2112 3256 hexaelement.exe 85 PID 3256 wrote to memory of 2112 3256 hexaelement.exe 85 PID 3256 wrote to memory of 2112 3256 hexaelement.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d53561bc250a8df21c55d281333c53c2_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
PID:4276
-
-
C:\Windows\SysWOW64\hexaelement.exe"C:\Windows\SysWOW64\hexaelement.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\hexaelement.exe"C:\Windows\SysWOW64\hexaelement.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2112
-