Analysis
-
max time kernel
104s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe
-
Size
391KB
-
MD5
8a463cdcee1d43e4c42491f44b04c2f9
-
SHA1
b7b247d16c51f64c3614e1f936bfd14f61dabf03
-
SHA256
89b004a23d58255da50ca8d16457e858864c2a09592a5acf11bb279563d752e5
-
SHA512
30162cc21be979e0162a5d29c34f16b92f2de72be9e1444d9b831c56489c70b7a16d2d533b99ffdee0a355adaf24ef64d8d4e9299255545000c82d111e13d1cc
-
SSDEEP
6144:I/zl2NkDSDe+OwSPQXsPF98gWNlPTGQQm6agrdBXy:I/zl2NkwezasPsNtTirdBC
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Temps.bat JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe File opened for modification C:\Program Files\Common Files\Temps.bat JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4616 4104 JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe 89 PID 4104 wrote to memory of 4616 4104 JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe 89 PID 4104 wrote to memory of 4616 4104 JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\PROGRA~1\COMMON~1\temps.bat2⤵
- System Location Discovery: System Language Discovery
PID:4616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5ea4bdfe7512baedfa4c30ffd59308934
SHA11430bf31a92f4023d7c83f736022de978aae1c2e
SHA2561fba34623228c4e71c378d9da280984ad36fac636727a006da3df924dc65a8b7
SHA5121ce5d4ee1032035b5fad4290af497f620507af956d351896d847a5e507f8a2ad2d1143954c32969a7d13aedf419da7d34c905cd3c9707c4bc0e9b8a0687b6db0