Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_40dae164a12ef43021c251c09a220a49.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_40dae164a12ef43021c251c09a220a49.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_40dae164a12ef43021c251c09a220a49.exe
-
Size
169KB
-
MD5
40dae164a12ef43021c251c09a220a49
-
SHA1
85556d3985d670e77473174f72e380bf7aec1a31
-
SHA256
bdd3f91844cb608e1e132ace535b828042a5d2d638931ff426e4bdbc61f43978
-
SHA512
4b7f770dc0b96fbd3241a32ede363a7541f93da7623ea1d7351b19bff57710f174ecbcb799b2364392247739a844862da185644ff1075e972efbe01d1d64624e
-
SSDEEP
3072:sfEnUz/dIPZ9EAwhTUmkOsAwZtJpAYkHMkqOdj2/si4G/dFiPTBMx1VzmiHS7i:ssUp2Z9EAwh+HvtjQskqOd6/qaFi7oR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2192 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_40dae164a12ef43021c251c09a220a49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2192 2164 JaffaCakes118_40dae164a12ef43021c251c09a220a49.exe 31 PID 2164 wrote to memory of 2192 2164 JaffaCakes118_40dae164a12ef43021c251c09a220a49.exe 31 PID 2164 wrote to memory of 2192 2164 JaffaCakes118_40dae164a12ef43021c251c09a220a49.exe 31 PID 2164 wrote to memory of 2192 2164 JaffaCakes118_40dae164a12ef43021c251c09a220a49.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40dae164a12ef43021c251c09a220a49.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40dae164a12ef43021c251c09a220a49.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Pgb..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD58b8877f43909a54f45f9debbd98a7833
SHA18cdc79cf6b6a3219cbc93127d61032d327862121
SHA256fe06a73e2ddaa3acfb1028b9888776e81d8202c626bc2bddb84da04eb5353dbd
SHA5124d0571cdf26ff8dc7bf3633de45882a37584b6d64a191be55ab965168f40c111c1f71ffe10603c2354ac64f782d31d17c472f8de36c1b5a4d2b960db414624ce