Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 05:58
Behavioral task
behavioral1
Sample
JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe
-
Size
275KB
-
MD5
cc2eb1c47b888609af9f408aa765c09a
-
SHA1
7c548ca820cd1b992ec7f879fa83ff4678b047be
-
SHA256
b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc
-
SHA512
0808b78730915e298975512b07d5a71cabe0cc3275d24835e2729e31dc98bbecf335e29758f31bd03050ab4032adca7f60b0de14253d7eb10615f6e0dc9d38c0
-
SSDEEP
6144:EMbC0SbzJjbSLPWstc7e72gk6ZVxw4ufGxs4lDWyWZsPGhOikTuid8umn6Bg:EG/CzJxgk4w4ufGJlDFWZsbikTuidB+j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2956 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2660 2496 JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe 30 PID 2496 wrote to memory of 2660 2496 JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe 30 PID 2496 wrote to memory of 2660 2496 JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe 30 PID 2496 wrote to memory of 2660 2496 JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe 30 PID 2660 wrote to memory of 2956 2660 cmd.exe 32 PID 2660 wrote to memory of 2956 2660 cmd.exe 32 PID 2660 wrote to memory of 2956 2660 cmd.exe 32 PID 2660 wrote to memory of 2956 2660 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\ & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2956
-
-