Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 22:33

General

  • Target

    JaffaCakes118_017b2cd27844e65918619a70bf51c005.exe

  • Size

    104KB

  • MD5

    017b2cd27844e65918619a70bf51c005

  • SHA1

    c4d0faffc5780d1228f2b1d47094937085131db4

  • SHA256

    751b20cde6115909091fe3f8678445202b3dc5082441c19508152d635cbff6cf

  • SHA512

    ea76fd81ea6b3f95e717b68482d1be3f8c97843eb5dbcb9bbc4d1f522a71c9e96a1605e5f5a4270639be2e47b4dc1bfa9612975303e23316e7221691abe49daf

  • SSDEEP

    1536:jrcImRjJEaFtho6n4/DggkrXlwwNdBempwGcA7Vc7+eUb:XcxRaa1o/EfrXbN3eaNcu+aeU

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Deletes itself 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_017b2cd27844e65918619a70bf51c005.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_017b2cd27844e65918619a70bf51c005.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_017b2cd27844e65918619a70bf51c005.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_017b2cd27844e65918619a70bf51c005.exe" del
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\SysWOW64\cmd.exe
        /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE.tmp >> NUL
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:1164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2724-4-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB