Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 19:53
Behavioral task
behavioral1
Sample
JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe
-
Size
275KB
-
MD5
8a64b62bd2d7d89f4739c78626015be7
-
SHA1
74f854b58bde93abe941c4b14469db10abfefaed
-
SHA256
9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105
-
SHA512
380168a4c878cbb523fe711ca7e45d81e86fbbf4545f4a7725f7409d68ac1d9afb601d5242307ecd086b0165baca1702ada15f156e76382ec3c16aecc17f3cb2
-
SSDEEP
6144:WMbC0SbzJjbSLPWstc7e72gk6ZVxw4ufGxs4lDWyWZsPGhOikTuid8ukn6Bg:WG/CzJxgk4w4ufGJlDFWZsbikTuidBwj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2076 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 316 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2076 2244 JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe 28 PID 2244 wrote to memory of 2076 2244 JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe 28 PID 2244 wrote to memory of 2076 2244 JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe 28 PID 2244 wrote to memory of 2076 2244 JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe 28 PID 2076 wrote to memory of 316 2076 cmd.exe 30 PID 2076 wrote to memory of 316 2076 cmd.exe 30 PID 2076 wrote to memory of 316 2076 cmd.exe 30 PID 2076 wrote to memory of 316 2076 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\ & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9e6ae81896be9b568604e08dcd1407e536b1a9fbadb313e9cafecca981f4e105.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:316
-
-