Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe
-
Size
148KB
-
MD5
e17b56afbbf5c7d669daf90cd32ed3fb
-
SHA1
6e6dde19b109557fad3b707450dbce8e3b9f0f01
-
SHA256
6a5a61dadd6c32095ca3450ece4524005929b0a33c4547e27112645274667364
-
SHA512
369010becdafefe41741ea5702e37b12c61864fa930c0459661c1f0681497575cf98f70b32e96cdbe127bbd2362c9ea796459716eb3f5a5d3ad075df644a7f5f
-
SSDEEP
3072:/N/TZBtHwLQtR+5TC+u28gnB9CRhodfZyFT/q629tPp7zseZ:/N/3+5TqY9CI9s5C6st2
Malware Config
Signatures
-
Emotet family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sensordivider.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sensordivider.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 5088 e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe 5088 e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe 4364 e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe 4364 e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe 2640 sensordivider.exe 2640 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe 1164 sensordivider.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4364 e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4364 5088 e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe 82 PID 5088 wrote to memory of 4364 5088 e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe 82 PID 5088 wrote to memory of 4364 5088 e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe 82 PID 2640 wrote to memory of 1164 2640 sensordivider.exe 84 PID 2640 wrote to memory of 1164 2640 sensordivider.exe 84 PID 2640 wrote to memory of 1164 2640 sensordivider.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e17b56afbbf5c7d669daf90cd32ed3fb_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4364
-
-
C:\Windows\SysWOW64\sensordivider.exe"C:\Windows\SysWOW64\sensordivider.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\sensordivider.exe"C:\Windows\SysWOW64\sensordivider.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1164
-