Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe
-
Size
28KB
-
MD5
0e0803a1bf0b055149f3925a8a4040c4
-
SHA1
811d4ae57736c448445a97f3e9daf486096cc987
-
SHA256
d6c78fe3efb2b9862f4e74d73a9d94c239592defa1e331818ad1d0b0edac7fc0
-
SHA512
88392f70447a1a45903707f2a39e460a4c3cacfb9145718c62d659b8a877c62cd641a250f38168f46fa1267a2f88ab092fa29d2eca347b40d613cab1bed7df29
-
SSDEEP
384:ubM5hL+gLEQlOLR1URhGHw0MnJ8QezBMwP11AMKVHF8lSfXxc/sm:LzL/IQlOLjHDq8Qez+U11tpSvu/v
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ldlhtedg.dll = "{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}" 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2644 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2852 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ldlhtedg.tmp 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ldlhtedg.tmp 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ldlhtedg.nls 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32\ThreadingModel = "Apartment" 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2} 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32\ = "C:\\Windows\\SysWow64\\ldlhtedg.dll" 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2852 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2852 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe 2852 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe 2852 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2644 2852 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe 28 PID 2852 wrote to memory of 2644 2852 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe 28 PID 2852 wrote to memory of 2644 2852 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe 28 PID 2852 wrote to memory of 2644 2852 0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e0803a1bf0b055149f3925a8a4040c4_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DA58.tmp.bat2⤵
- Deletes itself
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD586c93c50b69d449c6b9da8a572d6c523
SHA11e22a57bcf67d9d71d384f262b9236bf41b871ed
SHA256f896daf08e2a6272944cd3b1e6dc73c731388198f5759706147354368a4cfaa3
SHA512bc98ee48f8edb70a1d041ea8a84db1f70df2636a77ccf1fd0bcbf08f4efa2b3c4d59dc61917a3803a241e103e04e12dd04ae849e172f98492d2db1c9e18de005
-
Filesize
2.2MB
MD51532bad369ce59f9313a38a63510568a
SHA150b478d02a049fab3fca3d99ec862da82d44975d
SHA2561bac6d24b8c1b5a25f23b072de1b9bb3fdf7b1e149964dcfd51d756021e3d612
SHA512445ae383f3e6d627103170b62ed0c9e8fbb78195b30c8c4773bcb2b94c0295d686d381f820a5cc411da2e829db293245aed2c676685a6c040796291019103f78