Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_99a962d4cf2fba162786252cfce2ad30.exe
Resource
win10v2004-20250314-en
4 signatures
150 seconds
General
-
Target
JaffaCakes118_99a962d4cf2fba162786252cfce2ad30.exe
-
Size
334KB
-
MD5
99a962d4cf2fba162786252cfce2ad30
-
SHA1
275d471ca25665286222300d5c105880771c17e5
-
SHA256
356799a710e0404f95deb687ce1244fbe24bf9f8a2e05655b0e23287ab102a93
-
SHA512
db7fbae8b9f64446b9457e56bb061f5395dfa562b0cd642ca8d252acf884d98b57cccc3db2911eb481fb5a54a0f24a9f23085fadae6c21ac9961db06959eaf54
-
SSDEEP
3072:z2odsnNFOq0btu1VNxXA4YBSJiD+eqYbz0z+9W0y5m0oxXhmjPRNj:z2odfqsu1VLQ4ssYUzOJh0oxXgjPPj
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\53515a47495d51105b465b = "C:\\Users\\Admin\\AppData\\Roaming\\ywco.exe" JaffaCakes118_99a962d4cf2fba162786252cfce2ad30.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_99a962d4cf2fba162786252cfce2ad30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ywco.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2900 JaffaCakes118_99a962d4cf2fba162786252cfce2ad30.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3976 wrote to memory of 3452 3976 cmd.exe 110 PID 3976 wrote to memory of 3452 3976 cmd.exe 110 PID 3976 wrote to memory of 3452 3976 cmd.exe 110 PID 1296 wrote to memory of 4716 1296 cmd.exe 111 PID 1296 wrote to memory of 4716 1296 cmd.exe 111 PID 1296 wrote to memory of 4716 1296 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99a962d4cf2fba162786252cfce2ad30.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99a962d4cf2fba162786252cfce2ad30.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\ywco.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Roaming\ywco.exeC:\Users\Admin\AppData\Roaming\ywco.exe2⤵PID:4716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\ywco.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Roaming\ywco.exeC:\Users\Admin\AppData\Roaming\ywco.exe2⤵
- System Location Discovery: System Language Discovery
PID:3452
-