Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xscfbjx.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
xscfbjx.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe
-
Size
265KB
-
MD5
a0a1f5ff78c714b094a5fb386e02a7a3
-
SHA1
10fd01e713a5b96d19fd636e646f231bdb059bf1
-
SHA256
187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f
-
SHA512
6db4734f3b1f13f4ad87dd3b604a8c6b37698e7b788604d53fd42a3cf0af9155c96f54ce5d2651ba2f905a385eddf0c57284bda0078bba4ad5f71adde9e05fe2
-
SSDEEP
6144:xNeZBEmUT5ohIP1DT1SDLiXoina7ZnkOnIhB:xN+BI5yWHOiXlKkHB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1688 xscfbjx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xscfbjx.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 1688 5044 JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe 83 PID 5044 wrote to memory of 1688 5044 JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe 83 PID 5044 wrote to memory of 1688 5044 JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\xscfbjx.exe"C:\Users\Admin\AppData\Local\Temp\xscfbjx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD558661627bbc5a0309c8c80c5886b2c78
SHA174a8ce5fa8a70b5493ede45a71df09bfe05d50b4
SHA2565332de813671b1190f3d39ab8e2a0342823563c9626137015e970e832fa7bc98
SHA512f515c00e50366c39a80b3097b1d197bf3f8cd426c5c6699e70ce3e77471f91ffc93540188afd9d25e088f13a0e4bd07cedf9ead39d79a34942ec785d9a1a4c35
-
Filesize
185KB
MD52045e2fba3e4e549f31ada7008b2af16
SHA1f97571e97a60f39be18af949c0971ccaaa88ef2e
SHA256c6b1b5674d75f753f483c25c44eb2c90e0a348372cf4ebcf5fb2cb57304bc239
SHA512b93ac0f34b23b809ff146cf42cb2b04a761ffaf3b48f3dcd45e1fc93ea5cf2bd46dd69d180e61a2c59742637b6079b32c5790ddfd100c0cb33854542a88251ac
-
Filesize
74KB
MD508b101029a510d1467056305f8bda101
SHA1938d534e3584b132ece92f01e0089304b9587803
SHA2563d897c1632a6234082cafef209af7ddb9f91a0af33b03e6d004e153a54d622c0
SHA512631cc7c7a08b9492661983200ecc9b96c2d958d756808ed8b5b431a1a29ec92d360866c41c5d8307a3d185bcdedb4e66d661ec812d47d1ae057013a8cbc0ccbd